Dedicated API security tooling, and specifically platforms that provide full life cycle security capabilities, help organizations that are facing the problem of API sprawl.
The Salt API Security Maturity Model was created with simplicity in mind rather than the complexity that comes with hundreds of activities and measures.
If 2022 is anything like 2021, we’ll see no shortage of API-related events this coming year. In no particular order of likelihood or preference, take a look at seven predictions for API security for 2022.
We’ve spotlighted the seven biggest API security incidents in 2021 that plagued many different companies of different sizes and across verticals and highlighted what we can take away from each event.
Evaluating and selecting API security tooling is critical as part of API security strategy and mitigating API attacks.
This API Security Checklist will help you close the gaps in your API security strategy based on industry best practices.
Follow these REST API security best practices to ensure the design of your REST APIs takes into account security, performance, and ease of use.
Credential stuffing is a type of cybersecurity attack in which hackers use lists of stolen user credentials to breach into a system.
The latest executive order (EO) zones in on a few areas of cybersecurity, but a primary focus is software supply chain security after incidents such as the SolarWinds attack
Researchers found Peloton APIs were leaking PII. Learn how to avoid this with your APIs.
While it is technically true that Experian’s systems weren’t directly breached, private data was most certainly leaked
Establishing and gaining adoption of secure build pipeline approaches is a multi-year endeavor for organizations.
Zero trust principles and the technologies that have emerged inevitably promote dynamic access control that is informed by application context, identity, and behaviors.
Salt Security is combining efforts with MuleSoft to bring best-of-breed API security to the market leader in API management and integration, the MuleSoft Anypoint Platform.
Our discussion focuses on steps you can take for better API security, and we also include some interesting mobile security and cloud security aspects.
While the shutdown of Parler remains politically charged, the event offers some valuable technical lessons worth reviewing, many of which tie directly into API security and how best to protect sensitive data.