In this version of API Security Weekly, learn about a DPD parcel tracking flaw, Apache Pulsar and Casdoor vulnerabilities, and trends in the API industry.
Zero trust could be the solution for your modern security perils. Read on to discover what zero trust and least privilege are — and how to get started.
Follow a brief explanation of CI/CD and how to implement caching of Maven dependencies in the pipelines while deploying your Mule application to CloudHub.
Discover benefits of a DevSecOps approach to API security, API vulnerabilities at F5, trends in API integration, bot attacks on APIs on the rise, and more.
In this article, learn the four major steps involved in the process of penetration testing for web applications and avoid leaving any security stone unturned.
Learn about API vulnerability in Safari 15 leaking user info, vulnerabilities in AWS, and a podcast with Rinki Sethi and Alissa Knight discussing API security.
We'll talk about the significance of SaaS security certifications, the many sorts available, and how to pick which one is appropriate for your organization.
We will go through the essentials of cloud security testing and provide a comprehensive checklist to ensure your cloud environment is safe from attack.
Authorization is not authentication, and OAuth2 scopes were never intended to be the substitute for a real microservices-focused authorization architecture.