API discovery
API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP
The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches reveals that US companies could face losses ranging from $12. The post ...
Find APIs Hiding in the Shadows
What’s hiding in the shadows? It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
Salt Security Applies Additional AI Capabilities to API Security
Salt Security has infused additional artificial intelligence (AI) capabilities into its software-as-a-service (SaaS) platform that should make it simpler to both discover APIs and triage levels of threat. Nick Rago, field CTO ...
What’s Needed For Effective API Threat Hunting?
A proactive and systematic threat hunting program is an effective step your organization can take to improve its security posture. Finding and containing threats before they escalate into major incidents will head ...
API Spyder: Doing the (Seemingly) Impossible
In my role at Cequence, I get to interact with our customers as well as with teams associated directly with product creation, data science and customer support. While sounding trite, these do ...
API Spyder: Doing the (Seemingly) Impossible
In my role at Cequence, I get to interact with our customers as well as with teams associated directly with product creation, data science and customer support. While sounding trite, these do ...
Getting API Discovery Right: Part 1
APIs are everywhere. Companies have increasingly turned to API development to quickly and efficiently create consistent, feature-rich applications. APIs have become the connective tissue of data exchange, but this raises important security ...
New API Research Shows 62% Growth in ATOs Targeting Login APIs
APIs are the Developer Tool of Choice and #1 Target for Malicious Use Today, everything is an app. A Tesla isn’t really a car – it’s a four-wheeled app. Every one of ...
Discovering Shadow APIs with Wallarm API firewall
Shadow APIs can be defined as active endpoints that you are not aware of. Some APIs are deployed but never documented. Others are services that don’t have an owner anymore. Some are ...