Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CDNs Won't Save Your APIs: Here's Why You Need to Rethink Security

Content delivery networks (CDNs) are great for performance—but terrible for protecting APIs. Attackers can poison the cache or route around security altogether when APIs are misconfigured. In this clip, Jeremy Dodson explains why relying on CDNs can expose critical business data.

How Businesses Use Satellite Imagery APIs To Work Smarter

Satellite images used to be hard to get and even harder to use. Now, that's changed. APIs have made satellite data more accessible than ever, and businesses are taking notice. With just a few lines of code, you can monitor land, track patterns, and uncover trends that are invisible from the ground. By integrating a satellite imagery API in your application, you bring powerful visual data into your daily operations. Whether it's for analysis, alerts, or reporting, the right image at the right time can make a real difference in how you see the world and interact with it.

Five Uncomfortable Truths About LLMs in Production

Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it run. At Wallarm, our experience has proved otherwise. Through rigorous testing and iteration, our engineering team uncovered several critical insights about deploying LLMs securely and effectively. This blog shares our journey of integrating cutting-edge AI into a security product.

Eliminate Your AWS API Blind Spots in Minutes

Traditionally, securing APIs in AWS has involved a frustrating trade-off. Obtaining a full view of your API Fabric requires weeks or months of deploying various agents, setting up traffic analysis, and enduring lengthy professional services engagements. The outcome? An unacceptably slow time-to-value that keeps you unaware of potential risks for too long. The main issue hasn't only been locating APIs, but also the extensive wait to identify them. But what if that trade-off is no longer necessary?

API Gateway Security: The Essential InfoSec Guide

As the software world shifted toward microservices and distributed architectures, the volume and complexity of API traffic have skyrocketed. Unfortunately, so has the number of API-related breaches and cyber attacks. Last year, nearly 44% of all advanced bot traffic online targeted API endpoints, while traditional web applications received just 10% of the malicious traffic. It’s no surprise that 57% of organizations admit to having suffered API-related breaches in the past two years.

API Gateway Security

In today’s threat landscape, enterprise security isn’t breached in the apparent places—it’s compromised in the seams. One of the most overlooked seams is the API gateway. While celebrated for its role in routing traffic and managing APIs, the API gateway has quietly become one of the most critical and exposed components in modern digital infrastructure.

Announcing a Dedicated Snyk API & Web Infrastructure Instance for Asia-Pacific

Snyk is delighted to announce a significant milestone for our customers and partners in the Asia-Pacific (APAC) region: the launch of a dedicated Snyk API & Web infrastructure instance, which is now available and hosted locally within the region. This investment addresses the critical needs of our growing customer base in the region, ensuring that they can benefit from our modern, developer-first DAST capabilities while meeting local data residency and compliance requirements.

CISO Spotlight: Rick Bohm on Building Bridges, Taming AI, and the Future of API Security

Nestled in a log cabin high in the Rocky Mountains, Rick Bohm starts his day the same way he’s approached his career: intentionally, with a quiet commitment to learning and action. Boasting more than three decades of cybersecurity experience, Rick has watched tech evolve from dial-up ISPs to advanced AI-driven security architectures – and through it all, he’s focused on one enduring mission: protecting data, organizations, and people.