Digital License Plates: Stupid, Pointless, Insecure

Digital License Plates: Stupid, Pointless, Insecure

Reviver’s Rplate digital license plates are insecure: Their design appears to be riddled with privacy holes (not to mention the daft nature of the product itself) ...
Security Boulevard
cybersecurity CPU

Salt Security Survey Shows Surge in API Attacks

Salt Security today published a quarterly report that found malicious application programming interface (API) traffic now accounts for 2.1% of all API traffic seen by its customers. On average, those organizations were ...
Security Boulevard
BOT Defense 2 minute Demo Video

API Threat Prevention and Comprehensive Protection: Part 3

Application developers have made one thing clear in recent years: APIs are now the tool of choice for efficiently creating fully-featured apps across web and mobile platforms. Businesses are now trusting APIs ...
BOT Defense 2 minute Demo Video

API Threat Prevention and Comprehensive Protection: Part 3

Application developers have made one thing clear in recent years: APIs are now the tool of choice for efficiently creating fully-featured apps across web and mobile platforms. Businesses are now trusting APIs ...

Some Recent API Security Related Gaffes, And How They Might Have Been Avoided

This is the second of three guest blogs as part of our collaboration with Cequence. In the first blog on August 30, I wrote about how we’ve seen the level of API ...
Hey API! What you Token?

Hey API! What you Token?

Technology is always evolving with some of it widely adopted, while others never get implemented. In some cases, the technology adopted for the sake of the latest and greatest is implemented incorrectly, ...
3 Steps to Shielding Right While Shifting Left for API Protection

3 Steps to Shielding Right While Shifting Left for API Protection

Most organizations have seen exponential growth in API usage in the last few years, driven by a rapid increase in mobile applications, containers, serverless computing, microservices architectures, and cloud adoption. However, APIs ...
3 Steps to Shielding Right While Shifting Left for API Protection

3 Steps to Shielding Right While Shifting Left for API Protection

Most organizations have seen exponential growth in API usage in the last few years, driven by a rapid increase in mobile applications, containers, serverless computing, microservices architectures, and cloud adoption. However, APIs ...
API Security Done Right: COVID-19 Exposure Notification System Minimizes Data Exposure

API Security Done Right: COVID-19 Exposure Notification System Minimizes Data Exposure

Security Professionals have a reputation for being paranoid and pointing out security or privacy flaws in just about everything. When the Privacy-Preserving Contact Tracing Project was first launched, many a security pro ...

Game Plan Execution: API Security and March Madness

A few months back we sat through an exercise to review API risk for a client. After looking through their inventory of all of APIs, someone raised the question “which API do ...

Secure Guardrails