The Anatomy of API Breaches
April 30, 2020
Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level.
In the past year or so, more than 200 breaches have been published on apisecurity.io. Some very well-known names are on that list. What did they do wrong? How can we learn from their mistakes and take an approach that prevents most common API abuse?
Our goal in this webinar is to share pragmatic, direct actionable best practices. Taking real breaches as examples, we will analyze what went wrong and how those breaches could have been prevented.
Field CTO and Co-founder