fbpx

API Security

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now? We are just about to finish yet another year -- 2022. And in terms of cybersecurity and specifically, API Security, the past 12 months has been quite a challenge for many industries. As with any emerging...

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It's time for another customer story from Traceable! Today's blog highlights NextRoll's journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into all APIs. Let's...

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It's Needed The 21st century has moved data storage practices from traditional modes such as the use of hard drives to incorporate cloud-based methods. Cloud data storage involves storing data in a secure manner on the internet through a...

Sensitive Data Leakage: Defined and Explained

Sensitive Data Leakage: Defined and Explained

Sensitive Data Leakage: Defined and Explained We live in a digital world where everything happens on the internet, from filling out important financial forms to online shopping. All such activities require you to fill in some sensitive data via the internet. As more...

OWASP API Top 10 for Dummies: Part III

OWASP API Top 10 for Dummies: Part III

OWASP API Top 10 for Dummies: Part III Welcome back to our blog series on the OWASP API Top 10! This is continued from Part I and Part II. If you haven’t read the first two parts in this blog series, check them out! These blogs are written for a non-technical...

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them There are a few real-life analogies we can use to describe APIs. One is that they're like doors that provide access to an underlying system. It's an apt security analogy. You want doors to open smoothly and...

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...

Scary Thoughts This Halloween: A World Without APIs!

Scary Thoughts This Halloween: A World Without APIs!

This Halloween, we’re gonna imagine the scariest thing possible: a world that is…suddenly…without APIs! Imagine it. You’re used to scrolling your smartphone, connecting to maps, music, and other apps in your car. You can order ahead on your phone, you can email any...

Jyoti Bansal Named Enterprise Security Tech Cyber Influencer

Jyoti Bansal Named Enterprise Security Tech Cyber Influencer

Traceable's Co-Founder and CEO, Jyoti Bansal Named to the Enterprise Security Tech Cyber Influencer Top 10 List Jyoti Bansal, Traceable Co-Founder and CEO has been named to the Enterprise Security Tech Cyber Influencer Top 10 List and we are super excited by the...

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective It’s that time of year again – cybersecurity awareness month! This year’s CISA theme is See Yourself in Cyber. The intention is to bring awareness to the more human aspects of cybersecurity. Specifically,...

Traceable Adds API Security Testing to it’s Platform

Traceable Adds API Security Testing to it’s Platform

Today, we are excited to announce API Security Testing! This addition to our API Security platform brings fully automated, closed-loop security testing to organizations’ APIs. We all remember the famous phrase of Andreessen Horowitz, “Software is eating the world”. It...

API Exploits: What Every IT Professional Needs to Know

API Exploits: What Every IT Professional Needs to Know

Smart companies use APIs to serve their clients. Whether the user is using a web browser or a mobile app, they're probably talking to an API. They make it easier to upgrade the user experience, add new products, and talk to new businesses and new markets.  But APIs...

API Sprawl: What It Is and Why You Should Care

API Sprawl: What It Is and Why You Should Care

When people think of software architecture, they often picture layers of code. But in recent years, there's been a shift from this model—known as the monolithic approach—toward a more modular development style. This new approach, known as microservices, has given rise...

Black Hat 2022 Recap: API Security and Data Security Top the List

Black Hat 2022 Recap: API Security and Data Security Top the List

The Black Hat Conference for 2022 has concluded and, once again, there was no shortage of new emerging security technologies, informative sessions, and broader concerns surrounding APIs, data security, the software supply chain and code security. The conference was...

eBPF and API Security with Traceable

eBPF and API Security with Traceable

eBPF promises to radically advance what our infrastructure, application, and security tools will be able to do. Here’s some background on what eBPF is, how it works, and why Traceable is the leading API Security solution working with eBPF.

Building an API Security Solution Framework

Building an API Security Solution Framework

The beginning of defining a framework for what requirements a good API security solution should meet. Intended to encourage a healthy discussion and be a tide that lifts all boats in getting to a more secure API-driven future.

What is a CRUD API?

What is a CRUD API?

This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways.