
Presented by:
Isabelle Mauny
Field CTO and Co-founder
Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level.
In the past year or so, more than 200 breaches have been published on apisecurity.io. Some very well-known names are on that list. What did they do wrong? How can we learn from their mistakes and take an approach that prevents most common API abuse?
Our goal in this webinar is to share pragmatic, direct actionable best practices. Taking real breaches as examples, we will analyze what went wrong and how those breaches could have been prevented.
Webinar Follow-up
Hope you enjoyed the webinar! Below you can download the slide deck, visit our blog
for full Q&A and learn more about 42Crunch!

The Anatomy of API
Breaches Slide Deck

The Anatomy of API
Breaches Q&A Blog

42Crunch API Security
Platform Data Sheet
Webinars: Watch our OWASP API Security Top 10 for tips on how to protect your APIs.
Resources
Want to learn more? Here are some resources to help you out.

Free Tools
Looking to make OpenAPI / Swagger editing easier? Or want to see how secure your API is? Check out our free tools.
Get the Tools!
API Security Top 10
Learn more about the OWASP API Security Top 10, how 42Crunch can help, and download our cheat sheet!
Learn More
Better Together
Already have API Management? Great! The 42Crunch API Security Platform is the perfect compliment. Get the data sheet.
DownloadReady to Get Started?
Developer-first solution for delivering API security as code.