API Security: Everything You Need to Know To Protect Your APIs

Logo
Presented by

Aaron Lieberman (Big Compass), Dan Gordon (Traceable AI)

About this talk

With more APIs in circulation than ever before, there has been a direct correlation to the number of API abuses reported across industries. This is because APIs are such a valuable asset to bad actors, but many organizations have not yet woken up to the realities of the need to protect their APIs from abuse. If you couple that with the fact that attacks on APIs have become more sophisticated, with some attackers even using AI themselves, then you can see why even some of the more security-conscious organizations can have trouble properly securing their APIs. A robust API Security posture can be broken down into several areas including: * Proper design and coding during the development process * API governance and compliance through visibility of all your APIs (shadow too!) and a mapping of how they connect to each other. * General application and API protection from tools such as API gateways, WAFs, NG-WAF, and RASPS * An always-updating understanding of your user behaviors regarding your APIs. You won’t have comprehensive API security without solutions in each of these areas. We will also discuss: * The roles of API developers, infosec, support, and enterprise architects as it relates to API security * Microservices role in making it difficult to secure your APIs * The importance of inventorying your APIs * How technologies like Traceable can help protect your APIs against advanced attacks Key takeaways: * Why your API's are a key attack surface for modern bad actors * Why API's are so much harder to secure than traditional web traffic * What's necessary to secure your APIs Why yesterday's solutions can't solve today's new API security challenges
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (47)
Subscribers (2261)
Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization.