Tuesday, July 5, 2022
  • Multi-Step Attack Vectors: When Vulnerabilities Form an Attack Chain
  • How Authentication Strengthens Security and UX
  • The Analyst Prompt #12: Harmony Blockchain Confirms Compromise and Theft of Approximately $100 Million USD
  • Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk
  • LogRhythm Regenerated: Delivering on Promises to Serve Our Customers

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Vulnerabilities 

Home » Cybersecurity » Threats & Breaches » Vulnerabilities » Stop Working in Silos: Integrating with APIs

SBN

Stop Working in Silos: Integrating with APIs

by Chris Hudson on July 24, 2018

It’s easy to be overwhelmed by the quantity of three-letter acronyms when you’re working with software and technology, but there’s three letters that are becoming increasingly more important in the world of software: API.

DevOps Connect:DevSecOps @ RSAC 2022

“Application Programming Interface” sounds like it’s going to be an ominously complicated topic, but it’s a term you should watch out for when you’re evaluating what technology toolset you implement, as having an API opens up a wide range of opportunities for expanding and integrating your information sources.

Perhaps the simplest description of an API is a method of data access (the list of vulnerabilities detected on your infrastructure, for example) or functionality (the tasks you use to carry out scans of your network) using scripts or software.

With a good API, you can automate many day-to-day tasks and reduce the amount of manual effort required to analyze data as well as let two different products interact together, granting you better insight into the relationships between one data point and another.

Tripwire’s product suite fortunately has a number of APIs you can use.

Tripwire Enterprise has a powerful API command set that you can leverage in your business-as-usual workflows to check for changes, manage promotion, and extract data to use with your other tools.

Tripwire IP360 similarly offers a robust API to help you do more with your vulnerability data. For example, rather than having a vulnerability score relating to detected vulnerabilities on a system in isolation, you can automatically extract the score and put it alongside other technical information in your environment such as when the machine was last backed up or when it was last patched to help drive your decision on what to prioritize on when planning upgrades.

Adding a full awareness of what’s going on in the rest of your (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Chris Hudson. Read the original post at: https://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/stop-working-in-silos-integrating-with-apis/

July 24, 2018July 24, 2018 Chris Hudson api, Connecting Security to the Business, Featured Articles, powershell, Vulnerabilities
  • ← Why Computer Criminals Are Targeting the NHS
  • Deception Technology: Giving Companies Home Field Advantage →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Using AI/ML to Secure the Hybrid Workforce
Inching Toward Defend Forward
Disgruntled Law School Applicant’s Cyberharassment Ends With Narrow Court Ruling
CISO Talk EP 22 – Diversity, Equity and Inclusion in Security – TechStrong TV
Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk
Vulnerability & Patch Roundup — June 2022
This Week in Malware—Python Cryptominers, 345 Dependency Confusion Packages
Security champions and DevSecOps: Invicti at Infosecurity Europe 2022
SYN Ventures and the Specialization of Cybersecurity Venture Capital
The Week in Cybersecurity: NATO creates cyber rapid response

Upcoming Webinars

Mon 18

Kubernetes Security

July 18 @ 1:00 pm - 2:00 pm
Tue 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Mon 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Wed 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk
Cloud Security Cybersecurity Featured Identity & Access News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Vulnerabilities 

Attackers Work Hard to Engineer Trust; SharePoint, OneDrive Accounts at Risk

July 5, 2022 Teri Robinson | 4 hours ago 0
Google Launches Advanced API Security to Combat API Threats 
Featured News Security Boulevard (Original) Spotlight 

Google Launches Advanced API Security to Combat API Threats 

June 30, 2022 Nathan Eddy | Jun 30 0
GAO: CISA, Treasury Must Assess Critical Infrastructure Risks
Cyberlaw Cybersecurity Governance, Risk & Compliance Incident Response News Security Awareness Security Boulevard (Original) Threat Intelligence 

GAO: CISA, Treasury Must Assess Critical Infrastructure Risks

June 30, 2022 George V. Hulme | Jun 30 0

Security Humor

Fredo & Pid’jin™ ‘Don’t Install That’

Fredo & Pid’jin™ ‘Don’t Install That’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.