threats - Tagged - Security Boulevard

Low Hanging Fruit Ninja: Slashing the Risks of the Human Element

A long time ago in a galaxy far, far away, I was not a Security Consultant.  I was a Chef.  And I worked as a corporate Chef for an organization that required ...
API security concept; Arrows pointing to a Post It with API Security written on it

API-First Strategies Require API-First Security

Editor's note: This post was originally published in July 2021 in ToolBox. Back in 2017, Gartner predicted that API abuse would be the most frequent attack vector for data breaches by 2022 ...
API Keys fishing

API Keys Can Be Phished Too

Photo credit: iStock.com/Evkaz We are all very aware of the issues around phishing of user credentials. But it is not only users that can be phished, apps can be too. In previous ...
woman with fire

Guest Blog: Alissa Knight on ‘Standing Outside The FHIR’

We are delighted to be hosting some unique content from our friend and recovering hacker Alissa Knight who will be writing on the topic of healthcare API security. In this blog, Alissa ...
Approov and Cloudflare v1

Closing Both Web and Mobile Doors To Automated Traffic

In this article we will look at the challenges of making sure that bots and other automated traffic can’t gain access to your backend systems, no matter how they try. Most enterprises ...
bouncers

Clubhouse Needs A Bouncer

Even if you only have a vague interest in app security I’m sure the recent furore around Clubhouse hasn’t escaped your attention. There is significant buzz around this invite-only iOS app. Enabling ...
Stacked stones, balanced

Balancing Mobile App and API Protection

A common discussion that comes up with customers is how they should consider the security requirements of their mobile apps and of the APIs that service them. A recent incident involving Nissan ...
positive-excited-eavesdropping-secret-holding-hand-near-ear4

Man-in-the-Middle: Myths and Legends

Man-in-the-Middle (MitM), or more correctly Person-in-the-Middle, is the technique of inserting yourself into API traffic to observe or manipulate requests and transactions as they pass by. In this article we’ll look at ...
API Security -1

Securing API Keys for Robust Mobile API Security

It’s been nearly half a decade since Gartner declared the API economy open, hailing it the enabler that could transform businesses into platforms. Since then, APIs have significantly evolved beyond their rather ...