How organizations can defend against the increasing API attack surface

How organizations can defend against the increasing API attack surface

Application programming interfaces (APIs) are growing in prominence. As APIs increase beyond the range of manual control, organizations may face greater security challenges.  Here, we talk to Karl Mattson, Director, Security Technology Strategy at Akamai.  Security magazine: Tell us about your title and background.  Mattson: With over 25 years of experience in cybersecurity and technology leadership roles, I have had the privilege of leading teams across financial services, retail, and federal government sectors. In July 2021,…

Read More

Tenable: 26,500 Cyber Vulnerabilities Risk SE Asia's Banks

Tenable: 26,500 Cyber Vulnerabilities Risk SE Asia's Banks

More than 26,500 vulnerabilities exist in the external attack surfaces of Southeast Asia’s 90 top banking and financial services organisations, according to new research by cybersecurity firm Tenable. About 11,000 of these exploitable internet-facing assets belong to Singapore’s top-tier institutions, including lenders and insurers. The assessment found weak SSL/TSL encryption, misconfigured internal assets, inconsistent URL encryption, and older APIs across the banking and finance industry in Thailand, Indonesia, Malaysia, Vietnam, the Philippines, and Singapore. The…

Read More

Getting API security right: Ensuring robust protection

Getting API security right: Ensuring robust protection

Application programmable interfaces (APIs) are an essential component of the online experience — from business websites and applications to consumer platforms like social media. APIs enable different software applications to communicate and interact with each other programmatically.  APIs create a unique security environment that can be difficult to get right. The big problem is that many APIs remain unmanaged and undiscovered, and even known APIs are often poorly protected. Without getting a handle on their…

Read More

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

The widespread integration of AI into enterprise applications, predicted to surge as soon as 2025, could further complicate the already challenging management of hybrid multicloud strategies in Australia and APAC regions and make them more unsustainable, according to application delivery and security firm F5. Kara Sprague, executive vice president at F5, told TechRepublic in Australia that the growth of AI applications will accelerate the complexity, cost and attack surface associated with enterprises’ use of multiple…

Read More

Securing APIs From Left to Right (and Everywhere in Between)

Securing APIs From Left to Right (and Everywhere in Between)

Major data breaches are on the rise, and APIs are increasingly being used to gain access to sensitive data. The reasons for this are twofold: APIs are the first line of defense into an application (and it’s data), and more and more applications are accessible via the cloud and APIs. Everything from non-critical functionality, like music streaming and social media, to extremely critical data, such as financial accounts and healthcare, is accessible 24×7 through APIs….

Read More

Driving API Security Forward: Protecting Vehicle-to-Cloud Communications

Driving API Security Forward: Protecting Vehicle-to-Cloud Communications

In the rapidly evolving automotive landscape, vehicles are no longer just machines that move us from point A to point B; they have transformed into complex, interconnected systems on wheels. With this transformation, API (Application Programming Interface) security has surged to the forefront of automotive design and engineering. APIs serve as critical gatekeepers, managing the flow of data between the vehicle’s Electronic Control Units (ECUs), external devices, and the cloud. But with great power comes…

Read More

Generative AI in the enterprise: 4 steps to prepare organizations

Generative AI in the enterprise: 4 steps to prepare organizations

Generative AI in the enterprise: 4 steps to prepare organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Less than 50% of companies have API security testing tools in place

Less than 50% of companies have API security testing tools in place

Less than 50% of companies have API security testing tools in place | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Understanding how hackers find their way in application supply chain

Understanding how hackers find their way in application supply chain

Understanding how hackers find their way in application supply chain | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How to build more secure APIs

How to build more secure APIs

How to build more secure APIs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3