Guarding Against API Abuse

Logo
Presented by

Menachem Perlman, Director Solutions Engineering, and Richard Meeus, Director of Security Technology and Strategy, Akamai

About this talk

Recognizing vulnerabilities in even the best-designed APIs. Do you know that even the most well-designed APIs can be abused? Organizations invest resources in designing robust and efficient APIs to meet the demands of a connected world. However, a stark reality remains: Even the most meticulously crafted APIs are not immune to abuse. Join our API security experts on Wednesday, December 13, as we discuss API abuse and the fact that no API, no matter how well designed, is safe. We will cover: - The anatomy of real API abuse - A deep dive into common attack vectors such as injection attacks, credential stuffing, and data scraping - API threat hunting tactics Register now and start protecting your APIs from abuse. Register now and start protecting your APIs from abuse.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (242)
Subscribers (23656)
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions.