Crank-Up Your API Security with Sender-Constrained API Tokens
In his latest blog, Francois takes a look at the API security best practice of sender-constraints and how to apply it to improve your overall security posture.
The API Academy provides expertise and best practices for the strategy, architecture, design and security of enterprise-grade APIs and microservices. Our free API education and certification programs are now available!
In his latest blog, Francois takes a look at the API security best practice of sender-constraints and how to apply it to improve your overall security posture.
In this first piece of our three-part series, we’ll examine the top three risks on the 2023 list: Broken Object Level Authorization, Broken Authentication and Broken Object Property Level Authorization.
In his latest blog, Bill takes a look at a few of the emerging API protocols and their impact on enterprise security models – with a few pointers for mitigating those concerns.
In this final blog in his series on OWASP API Security Top Ten, Bala takes a look at what’s likely ahead for API and application developers.
In part two of this series on the updated OWASP Top Ten API Security risks, Bala examines three more of the Top Ten: Unrestricted Resource Consumption, Unrestricted Access to Sensitive Business Flows and Security Misconfiguration.
In his latest blog, Francois takes a look at the API security best practice of sender-constraints and how to apply it to improve your overall security posture.
In this first piece of our three-part series, we’ll examine the top three risks on the 2023 list: Broken Object Level Authorization, Broken Authentication and Broken Object Property Level Authorization.
This blog reviews the OWASP, the Top Ten and API Security Top Ten, and opens the door for an upcoming series on the latter two.
For over a decade, we’ve provided thought leadership to global organizations on designing APIs, implementing API security, and modernizing mission-critical systems with continuous API management and microservices.
We offer practical, field-tested guidance on how to use microservices and APIs to create service mesh patterns that optimize the security and scalability of multi-cloud, hybrid cloud, and on-premise IT infrastructures.
New 5G and IoT applications will demand unprecedented levels of API performance, security, and governance. Ask us how your peers are integrating APIs and Digital BizOps to get ready for the coming revolution.