Hunting Down the Top API Security Threats to Your Applications

Logo
Presented by

Inon Shkedy, Head of Research @ Traceable AI

About this talk

Do you really know how secure your cloud applications are? You have a web application firewall in place, an API gateway in place, and are using a cloud identity and access management service. So you’re goof right? In this session we’ll learn about the top API vulnerabilities and see live how to find them and protect yourself against them. We will explore the OWASP API Top 10 and the new security challenges and strategies to understand the application, how it is changing, and how to detect anomalies to block threats, making businesses more secure and resilient. Join Inon Shkedy, Co-Leader of OWASP API Top 10 project and Traceable AI Security Researcher, and Anoop Kartha, API Security Evangelist to learn: - Why API vulnerabilities are different from traditional web application vulnerabilities - Why your traditional application security solutions aren’t enough - What are the top vulnerabilities you should be concerned about - How to detect and block bad actors from using these vulnerabilities against you
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (47)
Subscribers (2257)
Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization.