Securing the Digital Record

Recently, I was chatting with a group of colleagues – we were all complaining about doctors and waiting rooms, etc. During the conversation, I mentioned something that I thought was pretty interesting. Being over 40 and blonde hair/blue eyed, AND having spent my teens and 20s soaking up the sun, I’m basically putting my dermatologist’s children through…

Modern API Description Formats

For many organizations, the days of undocumented APIs are mostly gone. There are now several formats used to describe APIs. These machine-readable files can be converted into documentation and even be used to test integrations. While there are several formats, the most well-known is OpenAPI. In this article, we’ll provide a highlight of that and…

The Most Common API Authentication Methods

Unless your API is a public feed of read-only data, you likely need authentication. There are many options you could choose, which may vary depending on your use case. However, it’s unlikely you’ll need to go out and create your own authentication method. Whenever possible, use a standard that is widely implemented. Otherwise, developers will…

API Security Architect Certification

The new certification course for API Security Architect is now available. This is an in-depth, self-paced course, and by completing this course, you will be able to: Explain the unique security risks of APIs and identify typical areas of API vulnerabilities  Explain the purpose of OAuth 2.0 as a framework for authorization  Describe the current…