In this final blog in his series on OWASP API Security Top Ten, Bala takes a look at what’s likely ahead for API and application developers.
For App Developers
In part two of this series on the updated OWASP Top Ten API Security risks, Bala examines three more of the Top Ten: Unrestricted Resource Consumption, Unrestricted Access to Sensitive Business Flows and Security Misconfiguration.
In this first piece of our three-part series, we’ll examine the top three risks on the 2023 list: Broken Object Level Authorization, Broken Authentication and Broken Object Property Level Authorization.
This blog reviews the OWASP, the Top Ten and API Security Top Ten, and opens the door for an upcoming series on the latter two.
In his latest blog, Bala discusses the fundamentals of API security and what to look for with your API security provider.
This 3rd in a 3 part series furthers the discussion on OpenTelemetry and API Gateways can leverage Otel for new levels of observability for APIs.
In this second of a three part series, Gary discusses OpenTelemetry and it’s business benefits and advantages.
This article discusses adoption challenges with OAuth mTLS, steps one can take to mitigate those challenges.
This blog takes a look at GraphQL from a security perspective, and how to design a schema that meets CSO requirements.