Akamai Acquires Noname Security: A Boon for API Security?
In his latest blog, Bill takes a look at the pending acquisition of Noname Security by Akamai, and it’s potential impact on the industry.
In his latest blog, Bill takes a look at the pending acquisition of Noname Security by Akamai, and it’s potential impact on the industry.
In his latest blog, Bill continues to look at the ramifications for API Security with the immergence of generative AI – this time, from a business ramification and mitigation perspective.
In his 3rd blog on mitigating against the OWASP Top Ten, Bala discusses how proper security logging and monitoring is key to every enterprise’s security-in-depth approach. It’s time to take a fresh look at your process and make sure you are capturing and monitoring the most important transactions of your business.
In his latest blog, Bala takes a look at encryption and the impact of cryptographic failures on the enterprise.
In his latest blog, Bill takes a look at the evolution to multi-cloud, and the benefits and risks of adopting a multi-cloud API management strategy.
In his latest Blog series, Bala takes a look at how SQL Injection is becoming a common attack vector once again – and how to mitigate against this threat.
In his latest blog, Bill looks at the state of generative AI, its potential impact on API security, and how enterprises can mitigate against that impact.
In his latest blog, Bill takes a look at a few of the emerging API protocols and their impact on enterprise security models – with a few pointers for mitigating those concerns.
In this final blog in his series on OWASP API Security Top Ten, Bala takes a look at what’s likely ahead for API and application developers.
In this first piece of our three-part series, we’ll examine the top three risks on the 2023 list: Broken Object Level Authorization, Broken Authentication and Broken Object Property Level Authorization.