Home API Security

API Security

FBI Internet Crime report and API security

Amid growing cyber crimes and API hacks, shore up your API security

Cyber attacks and security concerns continue to hamper the IT industry, as new development practices, extra languages, and structural frameworks appear. In fact, a...

Gouvernance des APIs et sécurité: les bonnes pratiques pour atteindre vos objectifs de croissance

English translation provided below. Le 19 Mai, nous nous sommes rassemblés avec des entreprises et services publics autour de l’AIFE (L’Agence pour l'Informatique Financière de l'Etat) pour...

What is an API gateway?

APIs (Application Programming Interfaces) are the building blocks of modern business, but a single API is rarely the only part of the story. Enterprises...
Opening_strategic_sectors_blog

Critical sectors can find a balance between API security and opening up to their...

Companies in critical sectors, where security is especially important, can – and should – open up to their partners via APIs without being threatened....
API security best practices

API security: 12 essential best practices

API security should never be taken for granted. With the increasing demand for data-centric projects, companies have quickly opened up to their ecosystem through...
APIs and security

What is API Security? What you need to know

APIs are the building blocks of extraordinary digital experiences, but if you’re not properly managing them, they can also be a security risk. It...
OWASP API Security Top Ten

Practical API Security: The OWASP API Security Top Ten

API security is on everyone’s mind: after all, APIs always open up network-accessible interfaces that previously may not have been exposed. Making sure that...
Axway Amplify Fast and Secure Stop tinkering with APIs and start delivering secure business outcomes

Stop tinkering with APIs and start delivering secure business outcomes

You need a more scalable and consumable way to capitalize on opening key data and processes; you know that. You're also committed to using...
Axway Global Consumer Survey

Global Consumer Survey: Build trust and give people control to securely Open Everything

Here at Axway, we know that customer experience is a powerful force in business success. A good experience can elevate the brand, reliability, and...
benefits of cybersecurity_for_business

The benefits of cybersecurity for business – what you need to know to stay...

Companies are a prime target for attacks, whether large or small in scope. Every day there are hundreds of threats. Companies need to be proactive...
network security

What is network security?

Let’s face it, network structures are under siege from cyberattacks and vulnerabilities. These exposures can be wide-ranging from applications, users, data, or even locations....

5 security challenges to API protection

Let’s face it, APIs are everywhere and that makes protecting your APIs challenging at best. To be effective, security must be safe and secure....
contact tracing

You’re thinking about contact tracing wrong

Dear New York,  As I watch the city and local businesses be devastated by the impact of the virus, I see you making a big...
What is load balancing?

What is load balancing?

Load balancing refers to delivering incoming network traffic across a group of backend servers on the internet. The basic function distributes client requests and...

What are the best practices for implementing API authentication?

Dear Geek,   We are building an API and I am confused as to what kind of security we need? There are so many out there...
API and a Connector

The difference between an API and a connector: When do I use one? 

An API (Application Programming Interface) is a machine and human-readable definition of an access point to a function or service. You never develop an interface, you...

OWASP’s API Security 10 to 1

I'm sure we're all counting down the days until we can put our feet up and surround ourselves with loved ones but before that,...
API Portals importance

API Portals: Why are they important?

We often think of APIs in a very technical way, but in reality, APIs are about providing business offerings and value. Many organizations treat...
Top risks to API Security

API Security – Checking it Twice

While everyone's busy making their lists and hoping the big man in the red suit overlooks their indiscretions and brings them something nice, I've...
two-factor authentication

Two-factor authentication and smart cards for the DOD

From not so long ago, as shown in Peter Steiner's cartoon, as published in The New Yorker.  One dog to another, “On the Internet,...
API Proxy vs. API Gateway

API Proxy vs. API Gateway

Recently, someone asked me the question of using API proxy vs. API Gateway. Well, let’s start with the basic premise. You have your backend services and...
choosing the right API Gateway

Choosing the right API Gateway!

A critical component of an API-based architecture is to have an API Gateway. This becomes more important as organizations are breaking their monolithic services...
API Gateway capabilities and features

API Gateway capabilities and features

By now most enterprises have heard about the concept of full life-cycle API Management (FLAM), but it is not uncommon when discussing the components...
API Gateway capabilities

The role of the API Gateway–“You can’t handle the truth!”

I recently watched the courtroom scene from A Few Good Men where Jack Nicholson’s character, Colonel Jessep, takes the stand to determine if a...
Defcon 27 A Retrospective – Security in the Cloud

Security in the Cloud: Defcon 27 – A Retrospective

Thousands of security professionals descend upon Las Vegas every year to take part in a series of conferences known as Hacker Summer Camp (Black...
Microservices Governance

What is Microservices Governance?

Microservices Governance is a term that takes microservices one step further. It’s a practice or method that sets up policies, principles and solid preparations...
API Mashup

What is an API Mashup?

Have you been wondering what the definition of an API Mashup is? An API Mashup is an API that coordinates countless APIs. This process...
API security best practices

API security: How can AI help secure your APIs?

APIs enable Digitalization and make communication easier. And opening APIs requires security. But what does API security mean? Security is everywhere and applies on...
service mesh

What is a service mesh and what are its benefits?

What is a service mesh? A service mesh is an abstraction that allows application and service developers to focus on the business value of...
microservice architecture implementation

An example of microservice architecture implementation

Today’s buzzwords are in full command on the tech scene. Microservice architecture is on the rise and you are probably wondering, what is an...
API Security

API Security–A Primer

APIs are providing business value by enabling to improve efficiency, increase revenue and more. As companies are leveraging APIs to have them exposed out...

API and Microservices Management

Video Transcript APIs are a pretty simple concept. They connect systems so data can be easily used by apps on your phone, desktop or anywhere that...
APIs and HIP

How APIs and HIP are part of a successful strategy

Ever wonder how APIs and HIP are part of a strategy? According to The Forrester Wave™: Strategic iPaaS and Hybrid Integration Platforms, Q1 2019,...
API trends

The hottest API trends of 2018

It's hard to believe, but 2018 is coming to an end. As we look back on the year of changes and evolutions within the...
cyber security threats

Cybersecurity threats: Interview with Bernard Harquindeguy, Ping Identity

With an ever-growing environment of cybersecurity threats and attacks looming in the world today, from the Facebook data breach, to Google, T-Mobile and Verizon,...
API GATEWAY

Why you need an API Gateway and security

When you talk about API Gateway and security, the two go hand in hand. Why? Because an API Gateway by definition is the programming...
API microgateway

What is an API microgateway?

Complimentary article from David McKenna, VP Engineering at Axway. One tenet of a successful microservice strategy is the adherence to Conway's Law, which results in...
Artificial Intelligence in Financial Services

How Artificial Intelligence in financial services drives stronger customer security

Artificial Intelligence (AI) and the emergence of machine learning are rising as some of the top technology trends today, and they’re quickly making in-roads...
open API

API security breaches: Facebook restricts its Open API

We have recently been witnessing an ever-increasing number of data privacy and security breaches across many industries. API security breaches and open API are now...
sport API

Sports API for real-time data streaming–March madness

As the shots rain down, the spotlight will rightfully be focused on the athletes themselves. But how do those buckets turn into digits on...
api security and artificial intelligence

API security with AI (Artificial Intelligence)–Webinar

I’m sure you have noticed how big the topic of API security with AI (Artificial Intelligence) has become worldwide over the past year. This simulation...
Elastic Beam - Axway

API Security with AI – Interview with Elastic Beam

I'm delighted to welcome this week Bernard Harguindeguy, CEO at Elastic Beam. Stephane Castellani: Hi Bernard, can you please present Elastic Beam in a few...
Social login

The challenges of social login solutions

I would like to share with you today an an interesting complimentary article from SmartWave, Axway's partner in Switzerland. ===== Recently several clients have approached us to...
API Common Criteria Certification

The (Not So) Common Criteria Certification

It seems like every day now we see news about new cyber attacks, security breaches of high profile companies, and steadily rising growth of...
APIs Key

How to easily secure your APIs with API keys and OAuth?

Securing your API does sound like a complicated thing, but there are some basic things you can consider setting up your API in a...

API dynamic authorization–interview with Axiomatics

I would like to warmly welcome David Brossard today, VP Customer Relations at Axiomatics. Stephane Castellani: Hi David, can you please present Axiomatics in a...
Instagram’s API Security bug

Now my Mum starts asking me about API Security

If you get questions from friends or family around topics than usual are things you consider important but have a certain "nerd factor" then...
OWASP Top 10 RC1

API Security makes it into OWASP Top 10 RC1

The first Release Candidate of the popular OWASP Top 10 contained “under protected APIs” as one of the Top 10 things to watch out...
AI adoption

Six tactics to secure your APIs proactively

When talking about API security, some people just want to turn on a switch and would like to get a green light on being...
API attack prevention

API attack prevention, a real-life example

I posted a previous article about the ways to protect Web Services and protect REST APIs and got contacted to help with an inquiry around how...
API quota

What is API throttling, API quota, API rate limiting and API burst?

In the world of APIs, nobody gives direct access to his resources because you never know how much your services are going to be...
potential of HIP

Should REST API security risks keep you awake at night?

With the growth of REST APIs inside enterprises, but also outside their boundaries in their ecosystem, monitoring, protecting, and preventing attacks is key, and...
file sharing for Windows

Zoom on Web Service Security

API Security is an important topic and I would like in this article to get deeper into the specific case of Web Service Security. Web...
protect your API keys

How to protect your API keys

When it comes to authenticating API clients, a common solution is to deliver an API key to each of your API clients. As the API...
Syncplicity by Axway mobile

Why all companies should have a ransomware recovery plan

Cybercriminals are not only becoming more sophisticated but bolder. The most insidious computer crime today doesn’t involve viruses or stealing credit card numbers. Instead,...

Stay Connected

2,209FansLike
5,128FollowersFollow
1,330SubscribersSubscribe