Articles by Tag #apisecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

API Security Tools: Threat Protection vs. Testing & 8 Tools to Know

What Are API Security Tools? API security tools are software solutions designed to protect...

Learn More 5 0Oct 13 '24

10 API Security Standards and Protocols You Must Know

What Are API Security Standards and Protocols? API security standards and protocols are...

Learn More 5 0Oct 13 '24

API Security Scanning Tools: Ensuring the Safety of Your APIs

APIs (Application Programming Interfaces) are the invisible connectors powering modern web and mobile...

Learn More 5 0Jul 25 '24

Real-Time Threat Modeling with AI? This Open-Source WAF Does It.

1. Introduction Cyberattacks are becoming a daily occurrence—is your web app still...

Learn More 5 0May 16

Top 5 Ways to Secure Your Express.js APIs

Discover the top 5 proven methods to secure your Express.js APIs with practical examples and easy-to-follow steps.

Learn More 2 0Nov 27 '24

Building Resilient Backends: Secure Development Practices for Modern Applications

Backend development forms the backbone of any software application, managing critical operations such...

Learn More 1 0Nov 19 '24

How to Minimize the Risk of Secrets Leakage in Teamwork

When working in teams, especially on software development projects, secrets like API keys, tokens,...

Learn More 1 0Jan 20

Cách giảm thiểu nguy cơ rò rỉ Secrets khi làm việc đội nhóm

Khi làm việc nhóm, đặc biệt trong các dự án phát triển phần mềm, secrets như API keys, token, và mật...

Learn More 1 0Jan 20

Building Secure APIs: Best Practices for Data Protection

Introduction APIs are essential in modern web and mobile applications, facilitating...

Learn More 1 0Nov 4 '24

Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro

API Security is crucial, but developers must consciously ensure their data is protected. Learn how to securely work in Postman without leaking any sensitive data.

Learn More 1 0Mar 7

Protect JWT Token from Token Forgery and Data Manipulation Attack

Learn how to safeguard your applications from JWT vulnerabilities that can lead to token forgery and data manipulation. Discover secure implementation practices with real-world example code to ensure robust API security.

Learn More 1 0Jul 20 '24

Authentication Vs Authorization In Backend Systems

The backend system of any application handles sensitive data. That includes operations to create,...

Learn More 1 2Jan 30

The Difference Between Basic Auth and Bearer Token: Which API Tool Should You Choose?

In the evolving landscape of web development, secure API authentication is crucial for protecting...

Learn More 1 0Nov 8 '24

API Key Exposure & Insecure Supabase Access: a Bug Hunt

Like other developers I regularly lurk dev space subreddits, and came across a post by a business dev...

Learn More 0 0Apr 22

API Security Testing Tools: Key Features & 8 Tools to Know

What Are API Security Testing Tools? API security testing tools are specialized software...

Learn More 0 0Oct 29 '24

API Security Breaches: Top Causes, Real Examples and Prevention

What Is an API Security Breach? An API security breach occurs when unauthorized users...

Learn More 0 0May 8

API Security Checklist: 10 Steps to a Secure API

What Is an API Security Checklist? An API security checklist is a comprehensive set of...

Learn More 0 0May 11

10 Best Practices for Ensuring API Security

APIs meaning of Application Programming Interface are the backbone of modern software development...

Learn More 0 0Dec 26 '24

API Security Best Practices: 16 Ways to Secure Your APIs

What Are API Security Best Practices? API security best practices are measures and...

Learn More 0 0May 11

API Security Testing: Risks, Technologies and Best Practices

APIs are the backbone of many modern applications, allowing software solutions to communicate and...

Learn More 0 0May 5

Unauthenticated API endpoint can cost you Millions! Ask Twilio

In a concerning report, Twilio has confirmed a security breach in its Authy app. An unsecured API...

Learn More 0 0Jul 18 '24

API Governance Best Practices

API Governance is a term thats been floating around more and more over the last decade, but what...

Learn More 0 0Oct 15 '24

Secure Your APIs with ForgeRock Identity Gateway: API Security Best Practices

The ForgeRock Identity Gateway is a powerful tool for securing APIs, allowing developers to protect...

Learn More 0 0Jun 2

gatekeeper for golang

Beyond basic auth, your project provides incredible granular control for HTTP services. We're...

Learn More 0 0May 31

Levo's MCP Server live in action!

What if your security data could just talk to your tools - no more hunting through dashboards or...

Learn More 0 0May 27

Top API Security Companies and Their Products for 2024 🔐

As the digital landscape continues to evolve, APIs (Application Programming Interfaces) have become...

Learn More 0 0Nov 17 '24

10. Understanding API Rate Limiting

Understanding API Rate Limiting 🔍 Definition — API rate limiting is a technique used to...

Learn More 0 0Nov 5 '24

api penetration testing service provider in bangalore

API Penetration Testing Service Provider in Bangalore | Indian Cyber Security Solutions APIs play a...

Learn More 0 0Mar 1

API Security Scanning: Process, Tools, and Best Practices

What Is API Security Scanning? API security scanning refers to the process of identifying...

Learn More 0 0May 8

IAST vs. DAST: 5 Key Differences, Pros/Cons & How to Choose

What Is DAST? Dynamic application security testing (DAST) is a method for evaluating the...

Learn More 0 0Oct 22 '24