Innovating with Our Security Advisory Board

Innovating with Our Security Advisory Board

|
One of my biggest takeaways from my experience leading the product management team at Signal Sciences was the value of focusing on the ... Read More

Shift Left, Shift Right, or Other?

|
The phrase "shift left" is frequently used in software development, referring to the practice of integrating security considerations ... Read More
Thoughts on The New 2023 OWASP API Security Top 10 Release

Thoughts on The New 2023 OWASP API Security Top 10 Release

|
The Open Web Application Security Project (OWASP) has released their updated API Top 10 for 2023. This is a list of the top 10 security ... Read More

Detect and Fix API Vulnerabilities Using Validation, Secure Principles and Real-time Response

|
API vulnerabilities are often introduced in early development stages. Build safer APIs using validation, real-time response, and more ... Read More

Why Complete API Documentation Makes Your APIs More Secure

|
Open API documentation is often overlooked as a crucial aspect of security. Let’s explore its relevance in security posture using Swagger ... Read More

A Comprehensive Guide to Rate Limiting in the Age of APIs and Microservices

|
Rate limiting is a crucial security control that prevents excessive usage of APIs and services by clients. However, many people have an ... Read More

Pairing Reinforcement Learning and Online Training in API Security

|
Many cyber security companies are jumping on the machine learning bandwagon, but not all companies truly use the technology in the way ... Read More

The Importance of Speed in Security: Why Easy Deployment Matters

|
The importance of speed in security cannot be overstated. In today's rapidly changing threat landscape, security professionals need to be ... Read More

Why Shadow APIs are a Cultural Problem, Not a Technical One

|
Shadow APIs, also known as "rogue" or "shadow" IT APIs, are APIs that are created and used within an organization without the knowledge ... Read More

Mass Assignment 101

|
In this blog post, we'll take a look at what mass assignment attacks are, how they work, and why it's important for businesses and ... Read More