In his latest blog, Bill takes a look at a few of the emerging API protocols and their impact on enterprise security models – with a few pointers for mitigating those concerns.
In todayâ€™s digital ecosystem, enterprises are monetizing their valuable digital assets byconverting and exposing them as APIs. While APIs are building blocks of a digitalecosystem, exposing them to the outside world effectively and securely is key for theirsuccess. This business strategy accomplishment (exchange of information and creatingan ecosystem, etc.,) is dependent on an API management […]
This article discusses adoption challenges with OAuth mTLS, steps one can take to mitigate those challenges.
This blog takes a look at GraphQL from a security perspective, and how to design a schema that meets CSO requirements.
In this session, Daniel discusses how to better API resiliency using API gateways.
In this session, Francois takes a deep dive into how to better protection your enterprise from bad actors. He’s following by Skip Hovsmith (Approov) who dives into API client attestation.
In this Workshop session, Francois discusses some of the things learned as he dove into GraphQL and its workings.
Achieving an identity-centric security model is no small feat. The composable enterprise needs to be secured across multiple clouds, while providing end-users with delightful experiences, yet still maintain high levels of assurance. Oh yea… it has to scale too. This presentation shares lessons learned from our journey towards automating the distributed enforcement of access control rules, and how leveraging a symbiotic relationship between identity management and runtime API security infrastructure enables an identity mesh that spans across applications.
Adam’s latest blog discusses API Change management and how it allows us to create a process or a set of rules that shapes the way the API grows as more endpoints are added and as existing functionality changes. He then discusses the three factors to consider whenever making changes to an API.