Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Successful Strategies for API Security Deployments (Wallarm October 2nd Webinar)

With the dramatic rise in API threats, API Security is a must-have security control for large and small organizations. Securing your APIs requires a clear understanding of your infrastructure and technology stack. In this webinar, we'll explore the requirements, best practices, and pitfalls of deploying an API Security platform, including: Join Wallarm experts with vast experience deploying API security across different types of infrastructure for the informative presentation.

CISO Briefing: API Security is AI Security (API ThreatStats Q3 2024 Spotlight)

API threats against AI are on the rise. The Wallarm Research team has researched and dissected the top API threats from the 3rd quarter of 2024. This report explores the top significant threats, notable API breaches, identifies key trends, and provides actionable insights that can help you strengthen your API Security program.

GraphQL Security Breach: How 30 Million Accounts Were Hacked #hacked #databreach #graphql #api

In this video, we explore a real-world example of a GraphQL exploit that exposed 30 million user accounts to attackers. Learn how vulnerabilities in GraphQL led to access token generation and account takeovers, and what this means for API security.

API Security Essentials: What You Must Know About Positive and Negative Models #apisecurity #api

In this video, we dive into the fundamentals of API security by comparing two key security models: Positive and Negative. Learn how each model works, their pros and cons, and how to choose the right one to protect your APIs effectively.

The Role of JWT Tokens in M&A Risks: What You Need to Know! #DocumentationMatters #apisecurity

Mergers and acquisitions often expose hidden risks, including unsecured JWT tokens and poor documentation practices. Learn why proper documentation and risk management are crucial to avoiding security issues during M&A.

How Mergers & Acquisitions Are Leaving Your APIs Vulnerable #apiattacks #apimanagement #api

Mergers and acquisitions can expose critical API vulnerabilities, often overlooked due to poor documentation and lack of standardization. Learn about the hidden risks that can lead to delayed incident response and compromised security during M&A processes.