How-to: API Management and HTTP/2

As usage of the HTTP/2 protocol becomes more prevalent, it’s clear that your API security solution must be able to handle HTTP/2 traffic. The performance enhancements offered by HTTP/2 make it ideal for high volume network traffic and IOT use cases, and even simpler use cases will reap the benefits. What once seemed like a…

How-to: Real-time API Monitoring

Knowing how your API is performing has always been key, but as our APIs become a more important and a key part of your customer experience it needs to be looked at differently. Traditional API monitoring relies on the API and its components as part of application infrastructure. Although this is important it also misses…

Why Insufficient Logging and Monitoring Can Help Attackers Hide in Plain Sight

I’ve been working in information security for nearly 45 years and started my long journey with punch cards and mainframes leading to today’s cloud and zero-trust. Our world of computing has certainly evolved, and I can’t even recall how many post-security breach investigation teams I’ve been part of or how many cyber incident management teams…

Reactive Logic Overview

Reactive logic is your requirements entered as rules for your schema tables and views in Layer7 Live API Creator. These rules can include event rules, validation rules, and derivation rules. Live API Creator shares these rules across all resources that you explicitly define for your API and associates it with the row objects. This automatic…