days
-9
-6
hours
-1
-8
minutes
-4
0
seconds
0
-9
search

#api

There is indeed some catching up to do!

Enterprise security must catch up with API innovation

When it comes to API security, even companies with world-class security teams like Facebook and Google are getting caught off guard. In this article, Bernard Harguindeguy offers 12 must-have best practices for protecting API infrastructure from hacking and abuses.

Reaping the benefits

Web Components: Bridging the gap between frameworks

Components on the web have always been very framework-specific. That’s why it is not possible to use a component written in Angular directly in React (or vice versa). This is exactly where Web Components can help!

This is a security 101

Audit API security based on their OpenAPI contract

According to Gartner, by 2022 API abuse will be the most frequented attack vector on the enterprises. In this tutorial, Dmitry Sotnikov shows how you can use your API contract file to locate and remediate some of the common API vulnerabilities.

Interview with Doug Dooley, Data Theorem COO

API Discover & API Inspect promise to help enterprises combat Shadow APIs

Data Theorem recently launched two new API security products: API Discover, which helps enterprises combat what has been known as Shadow APIs, rogue APIs developers publish without proper enterprise security vetting that go undetected by today’s legacy security tools and API Inspect solution, which provides a continuous and automated security verification service to ensure the real-world operations of APIs always match their intended specs. We talked to Doug Dooley, Data Theorem COO about all this and more.