What Is the Principle of Least Privilege?
This is the age of the data breach. According to cybersecurity advocate DataProt, 68 records are lost or stolen each second, generating an average data breach cost of $3.92 million. Data breaches are a...
View ArticleInsider Threats and API Security: Key Issues to Consider
Insider threats and API security issues are two of the most significant dangers to modern organizations. Between June and December 2022, API attacks rose by 400%, while recent research found that 74%...
View ArticleHow AI Can Be Used In API Security
The tech space goes in cycles. The newest innovation often becomes the answer for everything (whether or not it’s the right implementation). And right now, AI is going through this hype cycle. AI has...
View ArticleAPI Gateway Best Practices To Improve Security
As the popularity of APIs continues to grow, it’s becoming increasingly important to ensure they are secure. An API gateway can be a powerful tool for improving the security of your APIs. By applying...
View ArticleCentralize Data Access Control with GraphQL
GraphQL is more than just a way to let client teams ship features faster, or backend teams efficiently reuse their existing services. When used as a layer to aggregate and orchestrate existing APIs,...
View ArticleHow Decentralized Identity Will Transform Banking
When Jesse James, noted outlaw of the old West, was asked why he robbed banks, he said, “Because that’s where the money is.” And he was right, but he may not be right for much longer. Because the way...
View ArticleProtecting SOAP Against OWASP’s Top Ten API Risks
SOAP, or Simple Object Access Protocol, is an API standard that is widely used in the industry. SOAP utilizes XML to format its communication, WDSL (Web Services Description Language) to define the...
View ArticleHow To Avoid API Business Logic Abuse
The 2023 OWASP Security Top 10 introduced some new security risks and vulnerabilities threatening APIs. These new additions are common threats and security risks that have arisen since OWASP published...
View ArticleHow Decentralized Identity Will Affect API Security
For the past several years, there’s been a spike in interest in federating digital user identity, largely due to demands brought on by the pandemic. Federation is a popular architecture for connecting...
View ArticleWhy Identity Control Is Crucial to Secure API Access
Have you ever used an authorization flow? Have you ever input a PIN to access an account? If you have, you’re already familiar with identity control. Identity control is vital for properly monitoring...
View Article
More Pages to Explore .....