Home API Security

API Security

benefits of cybersecurity_for_business

The benefits of cybersecurity for business – what you need to know to stay...

Companies are a prime target for attacks, whether large or small in scope. Every day there are hundreds of threats. Companies need to be proactive...

5 security challenges to API protection

Let’s face it, APIs are everywhere and that makes protecting your APIs challenging at best. To be effective, security must be safe and secure....
contact tracing

You’re thinking about contact tracing wrong

Dear New York,  As I watch the city and local businesses be devastated by the impact of the virus, I see you making a big...
What is load balancing?

What is load balancing?

Load balancing refers to delivering incoming network traffic across a group of backend servers on the internet. The basic function distributes client requests and...
API security best practices

API security: 12 essential best practices

With the increasing demand for data-centric projects, companies have quickly opened their data to their ecosystem, through SOAP or REST APIs. APIs are the...

What are the best practices for implementing API authentication?

Dear Geek,   We are building an API and I am confused as to what kind of security we need? There are so many out there...
API and a Connector

The difference between an API and a connector: When do I use one? 

An API (Application Programming Interface) is a machine and human-readable definition of an access point to a function or service. You never develop an interface, you...
API Gateway

What is an API Gateway?

API Gateways are API proxies that are put between the API Provider and the API Consumer. At its heart, an API Gateway is a...

OWASP’s API Security 10 to 1

I'm sure we're all counting down the days until we can put our feet up and surround ourselves with loved ones but before that,...
API Portals importance

API Portals: Why are they important?

We often think of APIs in a very technical way, but in reality, APIs are about providing business offerings and value. Many organizations treat...
Top risks to API Security

API Security – Checking it Twice

While everyone's busy making their lists and hoping the big man in the red suit overlooks their indiscretions and brings them something nice, I've...
two-factor authentication

Two-factor authentication and smart cards for the DOD

From not so long ago, as shown in Peter Steiner's cartoon, as published in The New Yorker.  One dog to another, “On the Internet,...
API Proxy vs. API Gateway

API Proxy vs. API Gateway

Recently, someone asked me the question of using API proxy vs. API Gateway. Well, let’s start with the basic premise. You have your backend services and...
choosing the right API Gateway

Choosing the right API Gateway!

A critical component of an API-based architecture is to have an API Gateway. This becomes more important as organizations are breaking their monolithic services...
API Gateway capabilities and features

API Gateway capabilities and features

By now most enterprises have heard about the concept of full lifecycle API Management (FLAM), but it is not uncommon when discussing the components...
API Gateway capabilities

The role of the API Gateway–“You can’t handle the truth!”

I recently watched the courtroom scene from A Few Good Men where Jack Nicholson’s character, Colonel Jessep, takes the stand to determine if a...
Defcon 27 A Retrospective – Security in the Cloud

Security in the Cloud: Defcon 27 – A Retrospective

Thousands of security professionals descend upon Las Vegas every year to take part in a series of conferences known as Hacker Summer Camp (Black...
Microservices Governance

What is Microservices Governance?

Microservices Governance is a term that takes microservices one step further. It’s a practice or method that sets up policies, principles and solid preparations...
API Mashup

What is an API Mashup?

Have you been wondering what the definition of an API Mashup is? An API Mashup is an API that coordinates countless APIs. This process...
AI-Based security

API security: How can AI help secure your APIs?

APIs enable Digitalization and make communication easier. And opening APIs requires security. But what does API security mean? Security is everywhere and applies on...
service mesh

What is a service mesh and what are its benefits?

What is a service mesh? A service mesh is an abstraction that allows application and service developers to focus on the business value of...
microservice architecture implementation

An example of microservice architecture implementation

Today’s buzzwords are in full command on the tech scene. Microservice architecture is on the rise and you are probably wondering, what is an...
API Security

API Security–A Primer

APIs are providing business value by enabling to improve efficiency, increase revenue and more. As companies are leveraging APIs to have them exposed out...

API and Microservices Management

Video Transcript APIs are a pretty simple concept. They connect systems so data can be easily used by apps on your phone, desktop or anywhere that...
APIs and security

APIs and security: What you need to know

APIs are extraordinary pieces of technology, yet they also come with security risks. It’s important to be fully aware of the necessary measures you...
APIs and HIP

How APIs and HIP are part of a successful strategy

Ever wonder how APIs and HIP are part of a strategy? According to The Forrester Wave™: Strategic iPaaS and Hybrid Integration Platforms, Q1 2019,...
API trends

The hottest API trends of 2018

It's hard to believe, but 2018 is coming to an end. As we look back on the year of changes and evolutions within the...
cyber security threats

Cybersecurity threats: Interview with Bernard Harquindeguy, Ping Identity

With an ever-growing environment of cybersecurity threats and attacks looming in the world today, from the Facebook data breach, to Google, T-Mobile and Verizon,...
API GATEWAY

Why you need an API Gateway and security

When you talk about API Gateway and security, the two go hand in hand. Why? Because an API Gateway by definition is the programming...
API microgateway

What is an API microgateway?

Complimentary article from David McKenna, VP Engineering at Axway. One tenet of a successful microservice strategy is the adherence to Conway's Law, which results in...
Artificial Intelligence in Financial Services

How Artificial Intelligence in financial services drives stronger customer security

Artificial Intelligence (AI) and the emergence of machine learning are rising as some of the top technology trends today, and they’re quickly making in-roads...
open API

API security breaches: Facebook restricts its Open API

We have recently been witnessing an ever-increasing number of data privacy and security breaches across many industries. API security breaches and open API are now...
sport API

Sports API for real-time data streaming–March madness

As the shots rain down, the spotlight will rightfully be focused on the athletes themselves. But how do those buckets turn into digits on...
api security and artificial intelligence

API security with AI (Artificial Intelligence)–Webinar

I’m sure you have noticed how big the topic of API security with AI (Artificial Intelligence) has become worldwide over the past year. This simulation...
Elastic Beam - Axway

API Security with AI – Interview with Elastic Beam

I'm delighted to welcome this week Bernard Harguindeguy, CEO at Elastic Beam. Stephane Castellani: Hi Bernard, can you please present Elastic Beam in a few...
Social login

The challenges of social login solutions

I would like to share with you today an an interesting complimentary article from SmartWave, Axway's partner in Switzerland. ===== Recently several clients have approached us to...
API Common Criteria Certification

The (Not So) Common Criteria Certification

It seems like every day now we see news about new cyber attacks, security breaches of high profile companies, and steadily rising growth of...
APIs Key

How to easily secure your APIs with API keys and OAuth?

Securing your API does sound like a complicated thing, but there are some basic things you can consider setting up your API in a...

API dynamic authorization–interview with Axiomatics

I would like to warmly welcome David Brossard today, VP Customer Relations at Axiomatics. Stephane Castellani: Hi David, can you please present Axiomatics in a...
Instagram’s API Security bug

Now my Mum starts asking me about API Security

If you get questions from friends or family around topics than usual are things you consider important but have a certain "nerd factor" then...
OWASP Top 10 RC1

API Security makes it into OWASP Top 10 RC1

The first Release Candidate of the popular OWASP Top 10 contained “under protected APIs” as one of the Top 10 things to watch out...
AI adoption

Six tactics to secure your APIs proactively

When talking about API security, some people just want to turn on a switch and would like to get a green light on being...
API attack prevention

API attack prevention, a real-life example

I posted a previous article about the ways to protect Web Services and protect REST APIs and got contacted to help with an inquiry around how...
API quota

What is API throttling, API quota, API rate limiting and API burst?

In the world of APIs, nobody gives direct access to his resources because you never know how much your services are going to be...
potential of HIP

Should REST API security risks keep you awake at night?

With the growth of REST APIs inside enterprises, but also outside their boundaries in their ecosystem, monitoring, protecting, and preventing attacks is key, and...
file sharing for Windows

Zoom on Web Service Security

API Security is an important topic and I would like in this article to get deeper into the specific case of Web Service Security. Web...
protect your API keys

How to protect your API keys

When it comes to authenticating API clients, a common solution is to deliver an API key to each of your API clients. As the API...

"Les Assises de la Sécurité" in Monaco

Monaco is a very glamorous place, it's well known for royalty, its palace on top of the rock, its F1 race and the wealth...

Stay Connected

2,209FansLike
4,948FollowersFollow
1,330SubscribersSubscribe