fbpx

API security

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

API Security Buyer’s Guide

API Security Buyer’s Guide

This guide delivers an overview of API security requirements and a checklist to organize your API security solution. Reserve your copy today.

Threat Vectors Datasheet

Threat Vectors Datasheet

This research helps guide engineering, security, and IT teams in prioritizing risks and mitigating business disruptions from API abuse and attack.

Building an API Security Solution Framework

Building an API Security Solution Framework

The beginning of defining a framework for what requirements a good API security solution should meet. Intended to encourage a healthy discussion and be a tide that lifts all boats in getting to a more secure API-driven future.

What is a CRUD API?

What is a CRUD API?

This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways.

API Security Solution Comparison Guide

API Security Solution Comparison Guide

Looking to understand the difference between the different API security tools? Compare different API security solutions across common criteria and see how they stack up.

A Beginner’s Guide to API Governance

A Beginner’s Guide to API Governance

API governance involves sticking to a set of principles when building an API. It’s crucial since apps, organizations, and data sources will use the API.

Log4Shell / Log4J Vulnerability Quick Start Guide

Log4Shell / Log4J Vulnerability Quick Start Guide

Log4Shell is one of the most impactful vulnerabilities we have seen in recent times. Traceable AI provides quick and complete protection for your applications from being exploited by Log4Shell.

Bigger Organizations Have Multiple Attack Surfaces

Bigger Organizations Have Multiple Attack Surfaces

Nowadays, protecting within the organization is table stakes, and we have to go beyond the four walls, we have to go and make sure that not only do we protect our organization, we also have to consider the ecosystem of our partners, the supply chain consisting of other third parties. These third parties and multiple stakeholders are going to interact with our systems, and we are going to interact with their systems using APIs. So, when we start interacting with APIs, cloud and SaaS models, the overall system is no longer within four walls or defined boundaries.

From Containers to APIs – A new perspective on Log4Shell

From Containers to APIs – A new perspective on Log4Shell

There is no fixed perimeter in the cloud, as microservices and applications connect through APIs. In the cloud, containers are created and destroyed depending on business demand, your infrastructure isn’t permanent, rather it’s ephemeral. Learn how to approach security in cloud native and containers.

December Software Release

December Software Release

December was an extremely busy month for Traceable as we worked with customers to protect their environments from the Log4Shell vulnerability.

API Hacking 101

API Hacking 101

The basics of API hacking including what they are, the API security top 10, how you can test for vulnerabilities in your APIs.

Hacking APIs

Hacking APIs

Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.

AuthN, AuthZ and the Growing Menace of API Breaches

AuthN, AuthZ and the Growing Menace of API Breaches

As distributed architectures become more popular, new API security vulnerabilities are on
the rise. Learn how to design authentication and authorization systems to protect web applications from attack.

Traceable AI Overview Demo

Traceable AI Overview Demo

In this 12 minute video see an overview of Traceable Defense AI and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API’s.

The Practical Guide to API Security

The Practical Guide to API Security

Aaron Lieberman shares best practices and insights into API security. This eBook is intended for developers, technical leads, architects, and leaders interested in building and securing a robust API environment.