fbpx

API Security

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

OWASP API Security Top 10 2023 RC Published

OWASP API Security Top 10 2023 RC Published

OWASP API Security Top 10 2023 RC Published Why API Security? APIs have become an integral part of modern software development. APIs allow different software systems to communicate and exchange data, enabling developers to create complex applications by combining...

Sensitive Data Exfiltration: The New Nemesis of API Security

Sensitive Data Exfiltration: The New Nemesis of API Security

Sensitive Data Exfiltration: The New Nemesis of API Security This past year has brought many different industries some of the worst data breaches in history, and API data breaches have topped that list. Large companies such as T-Mobile, Optus, and several automotive...

Traceable API Security Platform Update: End of 2022

Traceable API Security Platform Update: End of 2022

Traceable API Security Platform Update: End of 2022 Happy New year from the Traceable team! We want to share some key product updates released in the last two months. API Catalog - Complete Visibility and API Governance Improved automatic authentication detection...

Webinar Recap: FFIEC Compliance and What It Means for API Security

Webinar Recap: FFIEC Compliance and What It Means for API Security

Webinar Recap: FFIEC Compliance and What It Means for API Security Earlier this month, Traceable announced our capabilities for FFIEC compliance - but you may be wondering, what exactly are the new FFIEC new guidelines, and what does that mean for API Security? To...

T-Mobile’s API Data Breach: The API Security Reckoning is Here

T-Mobile’s API Data Breach: The API Security Reckoning is Here

T-Mobile's API Data Breach: The API Security Reckoning is Here We are roughly three weeks into 2023, and here we are, contending with the second major API data breach of the year. If this is any indication of how this year will progress, we have some hard questions to...

How API Abuse Became the Top Vector  for Data Breaches

How API Abuse Became the Top Vector for Data Breaches

Introduction - What is API Abuse? API Abuse has recently become an important topic among security professionals, and for good reason. In the past two years, we’ve seen large scale data breaches happen as a result of APIs being abused and misused in some way. API Abuse...

The CircleCI Data Breach: The TLDR

The CircleCI Data Breach: The TLDR

The CircleCI Data Breach: The TLDR CircleCI, a developer product focused on Continuous Integration (CI) and Continuous Deployment (CD), with over one million users, published an advisory this week urging its customers to immediately rotate all secrets following a...

Shadow APIs: The New Form of Shadow IT

Shadow APIs: The New Form of Shadow IT

Shadow APIs: The New Form of Shadow IT and What You Can Do About It While many security professionals are more than familiar with the term “Shadow IT”, Shadow APIs are just starting to become a known phenomenon.  And of course they’re becoming a big deal. Most...

Top Data Breaches of 2022 and What they Mean  for API Security

Top Data Breaches of 2022 and What they Mean for API Security

Top Data Breaches of 2022 and What they Mean for API Security 2022 was quite a year for data breaches. Isn’t that always the story? Each year, the data breaches become worse, resulting in higher costs, brand value erosion, and effectively propel so many security...

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now? We are just about to finish yet another year -- 2022. And in terms of cybersecurity and specifically, API Security, the past 12 months has been quite a challenge for many industries. As with any emerging...

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It's time for another customer story from Traceable! Today's blog highlights NextRoll's journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into all APIs. Let's...

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It's Needed The 21st century has moved data storage practices from traditional modes such as the use of hard drives to incorporate cloud-based methods. Cloud data storage involves storing data in a secure manner on the internet through a...

Sensitive Data Leakage: Defined and Explained

Sensitive Data Leakage: Defined and Explained

Sensitive Data Leakage: Defined and Explained We live in a digital world where everything happens on the internet, from filling out important financial forms to online shopping. All such activities require you to fill in some sensitive data via the internet. As more...

OWASP API Top 10 for Dummies: Part III

OWASP API Top 10 for Dummies: Part III

OWASP API Top 10 for Dummies: Part III Welcome back to our blog series on the OWASP API Top 10! This is continued from Part I and Part II. If you haven’t read the first two parts in this blog series, check them out! These blogs are written for a non-technical...

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them There are a few real-life analogies we can use to describe APIs. One is that they're like doors that provide access to an underlying system. It's an apt security analogy. You want doors to open smoothly and...

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...

Scary Thoughts This Halloween: A World Without APIs!

Scary Thoughts This Halloween: A World Without APIs!

This Halloween, we’re gonna imagine the scariest thing possible: a world that is…suddenly…without APIs! Imagine it. You’re used to scrolling your smartphone, connecting to maps, music, and other apps in your car. You can order ahead on your phone, you can email any...

Jyoti Bansal Named Enterprise Security Tech Cyber Influencer

Jyoti Bansal Named Enterprise Security Tech Cyber Influencer

Traceable's Co-Founder and CEO, Jyoti Bansal Named to the Enterprise Security Tech Cyber Influencer Top 10 List Jyoti Bansal, Traceable Co-Founder and CEO has been named to the Enterprise Security Tech Cyber Influencer Top 10 List and we are super excited by the...

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective It’s that time of year again – cybersecurity awareness month! This year’s CISA theme is See Yourself in Cyber. The intention is to bring awareness to the more human aspects of cybersecurity. Specifically,...

Traceable Adds API Security Testing to it’s Platform

Traceable Adds API Security Testing to it’s Platform

Today, we are excited to announce API Security Testing! This addition to our API Security platform brings fully automated, closed-loop security testing to organizations’ APIs. We all remember the famous phrase of Andreessen Horowitz, “Software is eating the world”. It...

API Exploits: What Every IT Professional Needs to Know

API Exploits: What Every IT Professional Needs to Know

Smart companies use APIs to serve their clients. Whether the user is using a web browser or a mobile app, they're probably talking to an API. They make it easier to upgrade the user experience, add new products, and talk to new businesses and new markets.  But APIs...

API Sprawl: What It Is and Why You Should Care

API Sprawl: What It Is and Why You Should Care

When people think of software architecture, they often picture layers of code. But in recent years, there's been a shift from this model—known as the monolithic approach—toward a more modular development style. This new approach, known as microservices, has given rise...

Black Hat 2022 Recap: API Security and Data Security Top the List

Black Hat 2022 Recap: API Security and Data Security Top the List

The Black Hat Conference for 2022 has concluded and, once again, there was no shortage of new emerging security technologies, informative sessions, and broader concerns surrounding APIs, data security, the software supply chain and code security. The conference was...