Achieving an identity-centric security model is no small feat. The composable enterprise needs to be secured across multiple clouds, while providing end-users with delightful experiences, yet still maintain high levels of assurance. Oh yea… it has to scale too. This presentation shares lessons learned from our journey towards automating the distributed enforcement of access control rules, and how leveraging a symbiotic relationship between identity management and runtime API security infrastructure enables an identity mesh that spans across applications.
Adam’s latest blog discusses API Change management and how it allows us to create a process or a set of rules that shapes the way the API grows as more endpoints are added and as existing functionality changes. He then discusses the three factors to consider whenever making changes to an API.
In his latest blog, Adam discusses the importance of continuous API documentation as your API collection grows (and likely becomes more complex).
In his latest blog, Balaji discusses continuous access evaluation and how to validate token revocation when deploying this model.
In this second part of a two-part series, Francois takes a look at #’s 6-10 of the OWASP API Security Top 10 risks and how to best mitigate them through a secured API management solution.
In his latest blog, Francois Lascelles takes a look at the rather stunning log4j exploit currently impacting enterprises, and how a properly configured API management solution can mitigate the risk.
In this three part article, we’ll cover some of the best practices in selecting the best TLS cipher suite algorithms with your API gateways.
Most organizations want to move…
Organizations of all sizes depend…
Anyone building APIs should know…