API Security Strategy

How to Get API Threat Hunting Off the Ground
This is the fourth and final post of our blog series on the importance of API threat hunting - and how to get your own API threat hunting program off the ground ...

What’s Needed For Effective API Threat Hunting?
A proactive and systematic threat hunting program is an effective step your organization can take to improve its security posture. Finding and containing threats before they escalate into major incidents will head ...

API Security is More than Protecting B2C APIs from Bots
Most security teams now realize that APIs are one of their biggest security blind spots. Many have responded by zeroing in on their most obvious area of API risk: the business-to-consumer (B2C) ...

API Security is More than Protecting B2C APIs from Bots
Most security teams now realize that APIs are one of their biggest security blind spots. Many have responded by zeroing in on their most obvious area of API risk: the business-to-consumer (B2C) ...

How Do you Protect an API from Scraping?
What is screen scraping, and how does it relate to APIs? Screen scraping is a common challenge for businesses with a significant online presence, such as financial services and e-commerce firms. It ...