{"id":11,"date":"2022-02-05T13:32:53","date_gmt":"2022-02-05T13:32:53","guid":{"rendered":"https:\/\/42crdev.prexihost.com\/?page_id=11"},"modified":"2023-01-23T12:46:18","modified_gmt":"2023-01-23T12:46:18","slug":"blog","status":"publish","type":"page","link":"https:\/\/staging2022.42crunch.com\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"\n\n\t\t
Earlier this month I had the chance to join my new colleagues from 42Crunch at our all-hands in Ireland and I couldn’t be more excited that there’s something special that we’re building here. Setting aside that Cork and Kinsale are some of the prettiest places I’ve ever visited, I was able to see how passionate …<\/p>\n
When Shift-Left is more than a marketing campaign Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t O grande susto Um amigo comentou comigo um epis\u00f3dio interessante: Telefonaram para ele dizendo que era um canal de n\u00edvel oito de seu banco, confirmando dados como endere\u00e7o, nome de m\u00e3e e pai, c\u00f4njuge, filhos etc, dizendo que existiam transa\u00e7\u00f5es suspeitas, e que a conta dele havia sido invadida e ele precisava ligar urgentemente para …<\/p>\n Sua empresa n\u00e3o tem alternativa: Proteger as APIs da forma correta passa a ser uma obriga\u00e7\u00e3o Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Recently we published an article on the log4shell vulnerability targeting log4j, in which we explained how APIs can be protected against injection attacks with a positive security model, and how 42Crunch easily enables such a model. Now, it’s time for the Spring4Shell (CVE-2022-22965) vulnerability, targeting the Spring framework, commonly used to build APIs. What can …<\/p>\n Lessons learned from the Spring4Shell vulnerability Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Why Developer-First API Security is Prevailing in Enterprise. The DevSecOps movement has led to a distinct “shift-left” in the enterprise where tasks are moved earlier in the development cycle so that developers can directly address production concerns as the code is being written. Companies are realizing greater business benefits from this shift-left approach, with accelerated …<\/p>\n Why Developer-First API Security is Prevailing in Enterprise Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Question: Everyone is talking about DevSecOps, why are we not able to fix the security issues? Despite the obvious challenges, Colin believes that the industry has made progress as compared to ten years ago when very insecure code was prevalent. Today’s code is definitely more secure and security is improving – thankfully most developers are …<\/p>\n How Developers Can Become API Security Champions Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Throughout the 3 part webinar series “API Security Landscape Today and the OWASP API Security Top 10 Challenges” we will publish blog posts that highlight some of the main talking points addressed by the speakers.\u00a0 In this post, Philippe and Colin explore the differences between APIs and web apps that necessitated the creation of a …<\/p>\n Why Do APIs Merit a Separate OWASP Top 10 Listing? Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t On December 9th, 2021, the log4shell vulnerability hit the news and it has since been every security team’s worst nightmare: trivially exploitable, huge impact with RCE (Remote Code Execution), on a component widely used across traditional enterprise technological stacks, both in in-house and third-party software. All this combined explains its CVSS rating of 10 – …<\/p>\n Protecting your APIs against Log4Shell with 42Crunch Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\t\t\t\t|\n\t\t \t\tPopular<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Dec 22nd 2021. \u00a0Author: Dr. Philippe de Ryck, Pragmatic Web Security, Like them or hate them, JSON Web Tokens (JWT) are everywhere. OAuth 2.0 and OpenID Connect rely heavily on JWTs. Many applications use JWTs to implement custom security mechanisms. And every language or framework offers plenty of support for JWTs. Unfortunately, JWTs also lie …<\/p>\n 7 Ways to Avoid JWT Security Pitfalls Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\t\t\t\t|\n\t\t \t\tPopular<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t The last two decades have seen a proliferation of software (according to GitHub there has been a 35% increase in code repositories in 2020 alone) into every aspect of our lives in the form of web or mobile applications. Adversaries have increasingly attacked these applications, and defenders have adopted various testing tools and technologies to …<\/p>\n Application Security Tools Are Not up to the Job of API Security Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Postman, the API collaboration platform for developers, advocates an API-First approach for companies. Using 42Crunch, API developers and application security teams can now implement API security design and testing as part of their API-First approach in Postman. Kin Lane, chief Evangelist with Postman recently joined Isabelle Mauny, Field CTO at 42Crunch for a webinar to …<\/p>\n How to test API security throughout the API lifecycle with Postman and 42Crunch Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t This document highlights how code annotations can be used to enhance the quality and the security posture for customers using .Net Core. 42Crunch security recommendations help enterprises discover and remediate vulnerabilities much more quickly (up to 25X more quickly) while saving 90% of manual costs (whether through internal efforts or external pen-testing). Using the Available …<\/p>\n Creating High Quality OAS Definitions with .Net Core Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t In the first part of this blog, we had covered the security aspects of Spring Boot Microservices and how to inject them into your code level to generate higher quality OAS (Swagger) files. In this second part, we will cover aspects regarding attributes, operations, and data. Data Validation for Secure APIs You must be aware …<\/p>\n Creating High Quality OAS Definitions with Springfox – Part 2: Data Validation Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t LOSING MY RELIGION: Successful and unsuccessful approaches to API Security in a global enterprise – A take on Ford Motor Company’s approach to API security and the journey to enforce security compliance while ensuring productivity of thousands of developers managing thousands of APIs. The Cybersecurity Snowball Effect With development Communities and product teams, there are …<\/p>\n Strengthening Your API Security Posture – Ford Motor Company Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Spring Boot is a popular framework to build applications and APIs. Leveraging the Springfox project and code annotations, developers can generate OAS files with a high 42Crunch Security Audit score. What is the 42Crunch Security Audit? The 42Crunch Security Audit is one of 3 services from the 42Crunch API Security Platform: it consumes OpenAPI (Swagger) …<\/p>\n Creating High Quality OAS Definitions with Springfox – Part 1: Security Definitions Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\t\t\t\t|\n\t\t \t\tPopular<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our webinar: “How to Best Leverage JWTs or API Security” We were unable to get to your questions, so below are all the answers to the questions that were asked! If you’d like more information please feel free to contact …<\/p>\n Questions Answered: How to Best Leverage JWTs or API Security Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Why do we need different solutions for API Threat protection? APIs are becoming a hot target for hackers. Analysts and cyber security specialists agree that the privileged position of APIs as the open doors to the enterprise kingdom make them a favorite to breach. For the past 20 years, Web Application Firewalls (WAFs ) have …<\/p>\n Why knowing is better than guessing for API Threat Protection Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our webinar: “OpenAPI for API Security – Why guess when you know?!”\u00a0Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. Webinar: OpenAPI for …<\/p>\n Questions Answered: OpenAPI for API Security Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our webinar: “Let’s shift API security left – sure, but how?”\u00a0Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”Webinar-Lets-Shift-API-Security-Left”] Don’t …<\/p>\n Questions Answered: Let’s shift API security left – sure, but how? Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t When talking to prospects or presenting our solution at conferences, we inevitably get asked the same question: what’s the difference between your solution and a Web Application Firewall (WAF)? The core difference is that we know what we are protecting, WAFs don’t. WAFs were built to protect web applications and there is no standard way …<\/p>\n 42Crunch approach vs. Traditional WAF approach: using positive security by default Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “42Crunch Security Audit for WSO2 API Manager 3.1” webinar. Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”WSO2-Webinar”] …<\/p>\n Questions Answered: 42Crunch Security Audit for WSO2 API Manager 3.1 Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Top API Security Issues Found During POCs” webinar. Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”POCs-Webinar”] Is …<\/p>\n Questions Answered: Top API Security Issues Found During POCs Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “The Anatomy of Four API Breaches” webinar. Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”Anatomy-API-Breach”] Does the implementation …<\/p>\n Questions Answered: The Anatomy of Four API Breaches Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “REST API Security by Design with Azure Pipelines” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us. REST API Security for\u00a0Microsoft Azure Pipelines.\u00a0Watch Webinar REST …<\/p>\n Questions Answered: REST API Security by Design with Azure Pipelines Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Protecting Microservices APIs with 42Crunch API Firewall” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”Protecting-microservices”] Can the sidecar be …<\/p>\n Questions Answered: Protecting Microservices APIs with 42Crunch API Firewall Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Are you properly using JWTs?” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us. [xyz-ihs snippet=”Jwt-webinar”] Is it considered safe if the …<\/p>\n Questions Answered: Are you properly using JWTs? Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Every day, new breaches show us that we still have a long way to go with API security. In order to protect APIs, enterprises need to take a holistic approach, which includes the following: Securing the infrastructure: OS configuration, network configuration as well as containers. Properly configuring application servers: enforce TLS 1.2\/1.3, remove weak cipher …<\/p>\n 42Crunch API Firewall and API Management: why you need both! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on the Positive Security for APIs: What it is and why you need it!\u00a0We couldn’t get to all of them so we wanted to follow-up with a full list of all the Q&A – and the slide deck as well! [xyz-ihs …<\/p>\n Questions Answered: Positive Security for APIs Webinar Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Download our OWASP API Security Cheat Sheets to print out and hang on your wall! Download Cheat Sheet If you missed our latest presentation, check out the slides here: Visit the APIsecurity.io encyclopedia to learn more about the OWASP API Security Top 10. Videos for each coming soon! A1 : Broken Object Level Authorization …<\/p>\n OWASP API Security Top 10 Cheat Sheet Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t You had questions, and we’ve got answers! Thank you for all the questions submitted on the OWASP API Security Top 10 webinar on Nov 21. We couldn’t get to all of them so we wanted to follow-up with a full list of all the Q&A – and the slide deck as well! [xyz-ihs snippet=”OWASP-webinar”] …<\/p>\n Questions Answered: OWASP API Security Top 10 Webinar Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t DevSecOps is a hot topic at the moment, and particularly relevant when dealing with API development. APIs are growing at an exponential rate: not only\u00a0 are they the backbone of any application, but microservices architecture imply exposing internal APIs for every microservice or group of microservices. The average number of APIs to protect within an …<\/p>\n Deploying DevSecOps for APIs: a tale of shifting left… Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Hot from the press! There is a mass assignment vulnerability in the Harbor registry. Mass assignment is entry A6 on the OWASP API Security Top 10 list. A6 is described in the OWASP API Security Top 10 as: An API endpoint is vulnerable if it automatically converts client parameters into internal object properties without considering …<\/p>\n Addressing Harbor Registry Vulnerability with 42Crunch Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t When we started 42Crunch 3 years ago, we were convinced that a new market segment would emerge: API security. And the market is now catching up with our vision! This is exemplified by the recent release of the OWASP Top 10 for API Security threats document, which highlights threats that do not apply to traditional …<\/p>\n API Security is not Web Application Security! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t A couple days ago, I gave an API security workshop to highlight the OWASP Top 10 issues for APIs and some of the mistakes we keep doing at development time and pay for at runtime. Many of the issues related to data, such as improper data filtering, mass assignment or excessive data exposure, could be …<\/p>\n We Need the Controller Layer Back! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t 42Crunch CEO, Jacques Declas, sat down with Alan Shimel of Digital Anarchist at this year’s RSA APJ show to discuss new trends in API Security, DevSecOps, and what tools you need to keep up! [Alan Shimel] Hey everyone, it’s Alan Shimel for DevOps.com Security Boulevard. We’re here in Singapore at RSA APJ. We’re right …<\/p>\n Revolutionizing API Security – 42Crunch + Digital Anarchist Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t The 42Crunch platform offers DevSecOps teams a unique set of integrated API security tools which allow discovery, remediation of OpenAPI vulnerabilities and runtime protection against API attacks. The 42Crunch June 2019 release introduces an updated, easy to use UI along with key enhancements to API contract security audit reports, full user management for organization administrators, …<\/p>\n Enhance Your DevSecOps Experience with the 42Crunch API Security Platform Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Last week, a new OWASP project was launched at the Global AppSec conference in Tel Aviv: the API Security Top 10 list. The project information and initial Top 10 list were presented by Erez Yalon (Checkmarx) and Inon Shkedy and you can download the presentation PDF. We have also created an OWASP API Security Top …<\/p>\n Hot off the press: the OWASP API Security Top 10 list! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Where is the truth and what’s the fiction ? In this webinar Alexei Balaganski, Lead Analyst at Kuppinger Cole and myself contrasted our experience with customers and prospects and came up with a list of facts and fictions about API security. We both have seen a surge of interest in API security after a challenging …<\/p>\n API Security: separating truth from fiction Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t We recently participated to the DZone mobile apps development guide to highlights some of the key best practices when dealing with API keys and tokens. Below is an excerpt, the full article is available on DZone! Modern applications, both \u00a0web-based and native, rely on APIs on the backend to access protected resources. To authorise access …<\/p>\n Token Management Security Best Practices Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t The APIWorld conference came to end last week. This was the first public preview of our platform! We had a blast talking to many attendees and presenting at the event. This also gave us the opportunity to address a few common questions relative to API security and our product. 1. I have seen 3 vendors …<\/p>\n API Security FAQ : the top 5 questions we answered at the APIWorld conference! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t APIs are the access doors to your enterprise assets and the backbone of pretty much any application that has been written in recent years. While most companies apply token-based access to APIs with OpenIDConnect and OAuth, there are still many aspects of security which are not properly covered for APIs such as common injection attacks, …<\/p>\n Start acting on API Security today! Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t Without any doubt, APIs have redefined the enterprise architecture landscape by becoming the building blocks of internal and external enterprise applications. APIs are now the entry point into most architectures, much like servlets and JSPs were in the application server era.\u00a0APIs give access to a wide range of applications, systems, databases and now things with …<\/p>\n Why do we need the A10 entry in the OWASP Top 10? Read More »<\/a><\/p>\n \t\tBlog<\/a>\n\t\t\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSua empresa n\u00e3o tem alternativa: Proteger as APIs da forma correta passa a ser uma obriga\u00e7\u00e3o\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Edgar Silva<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMay 18, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tLessons learned from the Spring4Shell vulnerability\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Pierrick Pr\u00e9vert<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tApril 1, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhy Developer-First API Security is Prevailing in Enterprise\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Hugh Carroll<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMarch 7, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow Developers Can Become API Security Champions\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Hugh Carroll<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tFebruary 15, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhy Do APIs Merit a Separate OWASP Top 10 Listing?\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Mark Dolan<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tFebruary 8, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tProtecting your APIs against Log4Shell with 42Crunch\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Pierrick Pr\u00e9vert<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJanuary 26, 2022\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t7 Ways to Avoid JWT Security Pitfalls\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Philippe de Ryck<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tDecember 22, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tApplication Security Tools Are Not up to the Job of API Security\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Colin Domoney<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tOctober 5, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow to test API security throughout the API lifecycle with Postman and 42Crunch\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Hugh Carroll<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 23, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCreating High Quality OAS Definitions with .Net Core\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Edgar Silva<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMay 3, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCreating High Quality OAS Definitions with Springfox – Part 2: Data Validation\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Edgar Silva<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tApril 26, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tStrengthening Your API Security Posture – Ford Motor Company\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMarch 31, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCreating High Quality OAS Definitions with Springfox – Part 1: Security Definitions\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMarch 9, 2021\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: How to Best Leverage JWTs or API Security\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tDecember 11, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhy knowing is better than guessing for API Threat Protection\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tOctober 25, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: OpenAPI for API Security\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJuly 23, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: Let’s shift API security left – sure, but how?\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 29, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t42Crunch approach vs. Traditional WAF approach: using positive security by default\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 20, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: 42Crunch Security Audit for WSO2 API Manager 3.1\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 1, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: Top API Security Issues Found During POCs\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMay 26, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: The Anatomy of Four API Breaches\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMay 4, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: REST API Security by Design with Azure Pipelines\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tMarch 26, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: Protecting Microservices APIs with 42Crunch API Firewall\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tFebruary 24, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: Are you properly using JWTs?\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tFebruary 3, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t42Crunch API Firewall and API Management: why you need both!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJanuary 29, 2020\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: Positive Security for APIs Webinar\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tDecember 16, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tOWASP API Security Top 10 Cheat Sheet\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tDecember 16, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tQuestions Answered: OWASP API Security Top 10 Webinar\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tNovember 22, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tDeploying DevSecOps for APIs: a tale of shifting left…\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tOctober 29, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tAddressing Harbor Registry Vulnerability with 42Crunch\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tSeptember 24, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tAPI Security is not Web Application Security!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tSeptember 17, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tWe Need the Controller Layer Back!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tSeptember 16, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tRevolutionizing API Security – 42Crunch + Digital Anarchist\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tAugust 22, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tEnhance Your DevSecOps Experience with the 42Crunch API Security Platform\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy 42Crunch<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 26, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tHot off the press: the OWASP API Security Top 10 list!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Newsdesk<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJune 18, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tAPI Security: separating truth from fiction\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tApril 16, 2019\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tToken Management Security Best Practices\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tNovember 19, 2018\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tAPI Security FAQ : the top 5 questions we answered at the APIWorld conference!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tOctober 10, 2017\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tStart acting on API Security today!\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJuly 25, 2017\t\t\t\t\t\t\n
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhy do we need the A10 entry in the OWASP Top 10?\t\t\t\t\t\t\t\t\t\t\t<\/h3>\nBy Isabelle Mauny<\/a>\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t | \n\t\t\tJuly 18, 2017\t\t\t\t\t\t\n
\n\t\tReady to Learn More?\n\t<\/h2>\n\t