The recent breach at Sisense started with an AWS access token to a Gitlab repository and has led to all Sisense customers having to rotate any access token they’ve ever given to Sisense. While most headline-grabbing breaches involve personal information, the...
Do you know what goes on in the darknet? Well, your API security could be at stake. DarkOwl, a leading provider of darknet data, has observed conversations on the darknet on topics including hacking APIs, stolen API secrets that are then traded in underground digital...
Gartner projects that cybersecurity spending will grow by 11.3% in 2023 to more than $188.3 billion. Yet, many companies still leave their most vulnerable and most valuable resource unprotected against modern threats.
If you work with any kind of tech, chances are that you’ve heard of (and used) JSON web tokens. While using JSON web tokens is now almost ubiquitous with machine-to-machine (M2M) communications, it can be easy to take them for granted.
Organizations are leveraging APIs more than ever. In 2021, 90.5% of developers said they will expand their use of APIs. Organizations also planned to spend around $23.6 million on APIs and other related technologies in 2022.
Many security professionals have a problem with API secrets management practices. In fact, 50% of security professionals have experienced an API-related breach, while the other 50% worry about having one. This statistic is important to acknowledge because it clearly...
There’s a big problem with the bearer model. Let's explore where, why, and how the bearer model falls short when it comes to defending APIs from modern threats.
In January 2022, Gartner analysts predicted that API security would become a significant cybersecurity threat. And we’ve seen time and time again that that prediction was correct.
Over the course of the last few years there has been a steady increase in the number of data breaches resulting from compromised API keys. Bad actors seem to be able to quite easily get ahold of API keys, certificates and tokens in order to access sensitive data. These...