Introducing business logic security testing for REST APIs

Introducing business logic security testing for REST APIs

REST API business logic security testing is available to all Escape users. Scan your REST endpoints and get your full vulnerability assessment ...
How to craft rogue API docs for a target when they don’t exist

How to craft rogue API docs for a target when they don’t exist

Learn how to reverse engineer an undocumented API using your own rogue docs. The post How to craft rogue API docs for a target when they don’t exist appeared first on Dana ...
API Sentinel 2 minute Demo Video

Unified API Protection for Telcos and Mobile Carriers – Time to Value

Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...
API Sentinel 2 minute Demo Video

Unified API Protection for Telcos and Mobile Carriers – Time to Value

Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...

What is OpenAPI and how does it affect API security?

When it comes to application development via APIs, there are a few questions that can determine both the quality of the resulting code and the security posture of the applications in production ...

What is OpenAPI and how does it affect API security?

When it comes to application development via APIs, there are a few questions that can determine both the quality of the resulting code and the security posture of the applications in production ...
SecurityMonitoringBlog1_7Dec.png

Add Security Events to Your Monitoring Tools

Real-time monitoring is important in every organization because it enables stakeholders to understand what is happening at any given time and react quickly. There are a lot of systems and devices we ...