Crank-Up Your API Security with Sender-Constrained API Tokens
In his latest blog, Francois takes a look at the API security best practice of sender-constraints and how to apply it to improve your overall security posture.
In his latest blog, Francois takes a look at the API security best practice of sender-constraints and how to apply it to improve your overall security posture.
In this first piece of our three-part series, we’ll examine the top three risks on the 2023 list: Broken Object Level Authorization, Broken Authentication and Broken Object Property Level Authorization.
This blog reviews the OWASP, the Top Ten and API Security Top Ten, and opens the door for an upcoming series on the latter two.
In his latest blog, Bala discusses the fundamentals of API security and what to look for with your API security provider.
This 3rd in a 3 part series furthers the discussion on OpenTelemetry and API Gateways can leverage Otel for new levels of observability for APIs.
In this second of a three part series, Gary discusses OpenTelemetry and it’s business benefits and advantages.
Many enterprises are unaware that their current infrastructure can work with OpenTelemetry. OpenTelemetry is the new cloud-native standard for application observability. This article is the first of a three-part series that explores the technology’s business benefits and advantages.
In today’s digital ecosystem, enterprises are monetizing their valuable digital assets byconverting and exposing them as APIs. While APIs are building blocks of a digitalecosystem, exposing them to the outside world effectively and securely is key for theirsuccess. This business strategy accomplishment (exchange of information and creatingan ecosystem, etc.,) is dependent on an API management […]
This blog takes a look at medieval methods to secure the castle – and how those methods actually translate directly to how modern enterprises protect their resources.