API Discovery Feature Release - AppTrana

API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP

The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches reveals that US companies could face losses ranging from $12. The post ...
Wallarm Demo: Shadow API Detection

Find APIs Hiding in the Shadows

What’s hiding in the shadows?  It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
Salt Security APIs, organizations, Open APIs API CIS COVID-19 cybersecurity

Salt Security Applies Additional AI Capabilities to API Security

Salt Security has infused additional artificial intelligence (AI) capabilities into its software-as-a-service (SaaS) platform that should make it simpler to both discover APIs and triage levels of threat. Nick Rago, field CTO ...
Security Boulevard
What’s Needed For Effective API Threat Hunting?

What’s Needed For Effective API Threat Hunting?

A proactive and systematic threat hunting program is an effective step your organization can take to improve its security posture. Finding and containing threats before they escalate into major incidents will head ...

API Spyder: Doing the (Seemingly) Impossible

In my role at Cequence, I get to interact with our customers as well as with teams associated directly with product creation, data science and customer support. While sounding trite, these do ...

API Spyder: Doing the (Seemingly) Impossible

In my role at Cequence, I get to interact with our customers as well as with teams associated directly with product creation, data science and customer support. While sounding trite, these do ...

Getting API Discovery Right: Part 1

APIs are everywhere. Companies have increasingly turned to API development to quickly and efficiently create consistent, feature-rich applications. APIs have become the connective tissue of data exchange, but this raises important security ...
New API Research Shows 62% Growth in ATOs Targeting Login APIs

New API Research Shows 62% Growth in ATOs Targeting Login APIs

APIs are the Developer Tool of Choice and #1 Target for Malicious Use Today, everything is an app. A Tesla isn’t really a car – it’s a four-wheeled app. Every one of ...

Discovering Shadow APIs with Wallarm API firewall

| | API discovery, API security
Shadow APIs can be defined as active endpoints that you are not aware of. Some APIs are deployed but never documented. Others are services that don’t have an owner anymore. Some are ...