When your ex-girlfriend's Instagram gets hacked through an API security breach, and your risque pictures go viral, you rapidly try to understand the root cause of this breach and commit to becoming an API security expert.Maybe that is Sep. 1, 2017 03:16 PM EDT |
![]() Aug. 31, 2017 11:30 AM EDT Reads: 5,154 |
What do API Security and MySQL have in common? Not much one hopes, especially if you are responsible for implementing enterprise-wide API Security. When picking any security product, particularly an API Security Gateway, an enterprise should Aug. 31, 2017 09:27 AM EDT |
API security is now a central concern for Web Application Firewalls (WAF). For over a decade, WAFs have been a necessary component of most web-based applications deployments. WAFs typically Aug. 9, 2017 07:59 AM EDT Reads: 375 |
API Security has finally made it into mainstream security consciousness. The premiere web application security OWASP Top 10 Threats has published its Release Candidate 1 (RC 1). SD Times provided a comprehensive overview on the implications of including Aug. 8, 2017 04:40 PM EDT Reads: 372 |
Three factors that will help determine the best approach for your organizationIn the world of application security, there are numerous options in the marketplace for both buying and building. Purchasing a centralized API Dec. 4, 2013 11:46 AM EST |
![]() Jan. 9, 2010 06:45 PM EST Reads: 11,296 |
If you're having trouble getting your head around a single cloud deployment, please feel free to skip this article. Now if you're someone who thinks that most IT resource will eventually live in a private or public cloud-based domain, you're not Jan. 8, 2010 05:38 PM EST Reads: 211 |
Here is an interesting article by Rob Barry titled: "In SOA, cloud Dec. 30, 2009 07:38 PM EST Reads: 260 |
![]() Dec. 30, 2009 03:30 PM EST Reads: 9,838 |