CloudVector

CloudVector Unveils Platform for Securing APIs

CloudVector today launched a namesake platform designed from the ground up to make it easier to discover application programming interfaces (APIs) and then secure them. The company formerly known as ArecaBay also ...
Security Boulevard
Breaking Down the OWASP API Security Top 10 (Part 1)

Breaking Down the OWASP API Security Top 10 (Part 1)

As a result of a broadening threat landscape and the ever-increasing usage of APIs, the OWASP API Security Top 10 Project was launched. From the start, the project was designed to help ...

Enhancing Application Security Processes

Organizations are performing a balancing act, pushing forward with digital transformation while seeking ways to optimize application security. The post Enhancing Application Security Processes appeared first on Radware Blog ...
Preventing Automated Malicious Bots

API Security Podcast: How APIs Enable Digital Transformation and Automated Attacks

It’s no secret that APIs are an invaluable tool for application developers who are tasked with doing more with less. In this Aite Radio Podcast, Alissa Knight and Shreyans Mehta, Co-founder and ...
Preventing Automated Malicious Bots

Prying-Eye Vulnerability: Direct-to-API Enumeration Attack Enables Snooping

The Prying-Eye vulnerability is an example of an enumeration attack that targets web conferencing APIs with a bot that cycles through (enumerates) and discovers valid numeric meeting IDs. If the common user ...
Why you need to be thinking about API Security

Why you need to be thinking about API Security

As cyber attackers continue to take advantage of vulnerable people, processes, and technology, they are now expanding their operations beyond “traditional” targets. It seems that nothing is outside of their jurisdiction and ...

APIs Ease Customer Interaction — and External Attacks. Here’s how to Protect Them.

To deliver seamless service experiences to our customers, businesses now rely heavily on application programming interfaces (APIs). These are a non-negotiable aspect of the way we streamline the interactions and conversations we ...
Threats on APIs and Mobile Applications

Threats on APIs and Mobile Applications

Web Application Programming Interfaces, or Web APIs, are essential building blocks of our digital lives. They provide the tools and protocols that enable web and mobile applications to provide dynamic content and ...

Stronger Together: Imperva API Security is Integrated with Red Hat 3scale API Management

Most enterprises today deploy a multitude of touchpoints where consumers can interact and access the information they require. For many organizations, APIs (Application Programming Interfaces) are the bread-and-butter for enabling inter-enterprise process ...
Better API Penetration Testing with Postman – Part 4

Better API Penetration Testing with Postman – Part 4

This is the final part of this series on putting together a better API testing tool-chain. In Part 1, I covered a basic introduction to Postman and how to use it to ...
Loading...