On-demand Webinar: The Anatomy of 4 API Breaches


About

Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level.

In the past year or so, more than 200 breaches have been published on apisecurity.io. Some very well-known names are on that list. What did they do wrong? How can we learn from their mistakes and take an approach that prevents most common API abuse?

Our goal in this webinar is to share pragmatic, direct actionable best practices. Taking real breaches as examples, we will analyze what went wrong and how those breaches could have been prevented.

 


Location


Get API Security news directly in your Inbox.

By clicking Subscribe you agree to our Data Policy


Upcoming Events

Construct Event Event Date Event End Date Event Location Event Category Event Image