API management
Find APIs Hiding in the Shadows
What’s hiding in the shadows? It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
Enterprises Fear Continued API Sprawl, Security Weaknesses
There’s no doubt that APIs enable developers to better customize their applications. Yet the continued growth and success of APIs as the glue that holds together digital transformation is proving to increase ...
API Protection and Cloud-native Application Protection Platforms (CNAPP)
Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems ...
API Protection and Cloud-native Application Protection Platforms (CNAPP)
Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems ...
Credential Stuffing Attack Prevention Saves $1.6M
In another example of pandemic influenced actions, the largest Canadian pizza chain was targeted by a credential stuffing attack that was successfully mitigated resulting in a $1.6M savings. Most people would not ...
Unified API Protection for Telcos and Mobile Carriers – Time to Value
Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...
Unified API Protection for Telcos and Mobile Carriers – Time to Value
Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...
Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) ...
Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) ...
Taking charge of the API security lifecycle
This article was originally published on Cyber Protection Magazine To ensure the seamless experience today’s customers expect, modern enterprises have become proficient API machines to create the seamless experience customers expect. APIs ...