Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What CISA's BOD 25-01 Means for API Security and How Wallarm Can Help

The US government has taken another significant step towards strengthening cloud security with the release of CISA’s Binding Operational Directive (BOD) 25-01. Aimed at improving the security posture of federal cloud environments, BOD 25-01 mandates robust configuration, visibility, and control across cloud-based services. While the directive doesn’t explicitly name API security, securing modern cloud systems relies on securing APIs - including the ones security teams don’t know about.

API Security Testing Checklist for Developers

APIs are the backbone of modern applications, facilitating seamless communication and data exchange. However, this ubiquity makes them prime targets for cyberattacks. As developers, building robust and secure APIs isn't just a best practice; it's a critical responsibility. This blog post provides a comprehensive API security testing checklist to help you identify and mitigate API vulnerabilities, ensuring your APIs are fortified against evolving threats.

API Discovery: Uncover Hidden Endpoints Before Attackers Do

APIs are targeted 43% more often than websites and suffer 160% more DDoS attacks. Undocumented shadow APIs and zombie endpoints expose your business to breaches. In this video, learn how comprehensive API discovery reveals hidden and outdated endpoints, reduces blind spots, and helps you secure your API landscape before attackers find their way in.

Protecting Digital Transactions with API and Web Application Security

Protecting Digital Transactions with API and Web Application Security In this video, A10 Networks' Jamison Utter and Gary Wang discuss why a different approach to security is required beyond purely transactional-based protection and detection. They delve into how entity-based tracking helps address the challenges of legitimate-looking requests that carry malicious intent, particularly in the context of Application programming interfaces (API) security and advanced threats, such as Layer 7 DDoS attacks.

Seamless API Security with Postman x Aikido

We’re teaming up with our friends at Postman to bring API security even closer to where developers already work. With the upcoming Aikido Security + Postman integration, you’ll be able to view recent security scans for your API collections—without ever leaving Postman. No new tabs. No switching tools. Just quick, clear security insights as you’re building. It’s never been easier to build and scale secure APIs as your organization grows.

Beyond Traditional Threats: The Rise of AI-Driven API Vulnerabilities

AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently, defending APIs meant guarding against well-understood threats. But as AI proliferates, automated adversaries, AI-crafted exploits, and business logic abuse have complicated matters. It’s no longer enough to merely patch known flaws; security teams must now contend with intelligent, adaptive attacks that evolve as fast as the technology they target.

Smarter API Security Demo: See How Wallarm Protects Modern APIs and Agentic AI

Modern APIs are under constant attack—from botnets to logic abuse to threats targeting Agentic AI. Most security tools lag behind. Wallarm doesn’t. Join us for a live walkthrough of Wallarm’s advanced API security platform. In this session you will see how to instantly discover vulnerable endpoints, protect business-critical flows, and stop API abuse—without slowing down your teams. What you'll learn.

API Security Is a Business Problem-Not Just an IT One

APIs are more than technical components—they're business-critical assets. In this powerful moment, Jeremy Dodson lays out why frameworks aren't enough and why companies must treat API security as a core business priority. Security leaders: it’s time to shift your mindset and protect real data flows, not just check boxes.

NGINX Integration: How to install nginx and instrument it to observe API traffic

In this step-by-step tutorial, we walk you through the complete process of installing NGINX and instrumenting it to monitor and observe API traffic. Whether you're just getting started or looking to improve your observability stack, this guide will help you set up NGINX for effective traffic monitoring. In this video you'll learn: Why is this important? Observing API traffic helps you detect issues early, optimize performance, and ensure your services are running smoothly.