APIs
How the Auth0 and Aembit Integration Boosts Non-Human Access Security
3 min read The collaboration automates workload-to-workload access, simplifying security for API connections and reducing the risks associated with credential management. The post How the Auth0 and Aembit Integration Boosts Non-Human Access ...
Akamai Embeds API Security Connector in CDN Platform
Akamai Technologies has made available at no extra cost a connector that makes it simpler for cybersecurity teams to discover application programming interfaces (APIs) that organizations have exposed via its content delivery ...
Contrast Security Founder Jeff Williams explains how to fix AppSec in production | Contrast Security
One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
How ADR fixes AppSec in production | Contrast Security Founder Jeff Williams Explains | Contrast Security
One of the most memorable parts of Black Hat was an interview with Alan Shimel of TechStrong TV and Katie Norton, Research Director at IDC. We had a wide-ranging discussion about the ...
Salt Security Extends Scope of API Security Platform
Salt Security this week extended its core platform to make it easier to discover and govern application programming interfaces (APIs) ...
ADR Security Technology for AppSec Vulnerabilities | Contrast Security
On Aug. 6, Contrast Security introduced a new security technology we call Application Detection and Response (ADR). ADR seeks to fill a critical gap in Application Security (AppSec) that leaves the application ...
API Transformation Cyber Risks and Survival Tactics
As you think about how to ensure your APIs are within your risk tolerance, ensure that you have a sound understanding of your inventory and the data associated with them ...
An Open Letter to API Vendors: Embrace Secure Authentication Methods, Abandon API Keys
3 min read As the demand for API access continues to grow, so does the urgency of adopting more secure authentication methods. The post An Open Letter to API Vendors: Embrace Secure ...
API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes
AI is rapidly increasing the pace of API creation within organizations, leading to API security becoming as significant as traditional application security. Here’s what you can learn from the top five API ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/29/24
Insight #1 According to Google, zero days being exploited in the wild jumped 50% last year. I just don't understand your thought process if you are not looking at control layers like ...