You Can't Secure What You Can't See: Protecting APIs
Last year, it was briefly possible for anyone with rudimentary technical knowledge to upload and host files — including potentially malware — on a .gov website. The vulnerability resulted in protest posts and pranks but, thankfully, no lasting damage. Even so, as the most devious or most paranoid among you likely already recognize, this vulnerability had all the makings of a dangerous and effective phishing campaign.