Over a million developers have joined DZone.

Why I Added Cybersecurity To My API Monitoring Research

Spreading the word on breaches, good practices, and keeping APIs safe are crucial. See why Kin Lane is focusing on cybersecurity in the API space and why you should, too.

· Integration Zone

Today’s data climate is fast-paced and it’s not slowing down. Here’s why your current integration solution is not enough. Brought to you in partnership with Liaison Technologies.

I recently added a new area of research to API Evangelist focused on cybersecurity. I added this area of research not because APIs are being used to hack systems, which does happen occasionally. I did this because I wanted to better tune into this area because APIs are being applied by all sides (are there sides?) to communicate, evaluate cybersecurity events, and spread their message — which is a significant part of what is cybersecurity.

When APIs aren't properly secured, and a breach occurs, I consider this a security topic and file it under my API security research. If something occurs in the wider global security theater, I file it under my cybersecurity research. This research doesn't always directly touch on APIs, but in many cases like the recent DNC hacks APIs are being used to analyze, study, share stories, and communicate around these often ongoing cybesecurity events.

I am seeing APIs often being used as part of the levers pulled when it comes to the theater of cybersecurity, whether it's anonymous bitcoin ransom payments, Guccifer 2.0 spreading the story of a recent breach of Twitter, or researchers doing their forensic studies. As with other areas of my API monitoring, establishing a dedicated research project helps me tune in closer to what is going on, identify key actors, and better understand the role of APIs in the fast-growing world of cybersecurity.

Is iPaaS solving the right problems? Not knowing the fundamental difference between iPaaS and iPaaS+ could cost you down the road. Brought to you in partnership with Liaison Technologies.

Topics:
cybersecurity ,api

Published at DZone with permission of Kin Lane, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

The best of DZone straight to your inbox.

SEE AN EXAMPLE
Please provide a valid email address.

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.
Subscribe

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}