Systems | Development | Analytics | API | Testing

API Security Testing: A Step-by-Step Guide & Best Practices

Imagine you’ve built an advanced app, your users love it, and your business is thriving. But one day, you wake up to the news of a data breach—your API was hacked, and sensitive user data is now roaming the dark web. Sounds like a nightmare, right? Unfortunately, this scenario is all too real. According to a report by Salt Security, 94% of organizations experienced security issues in their production APIs, with 17% suffering a breach due to API vulnerabilities.

Kong Insomnia 11: Elevating API Security and Collaboration

We’re excited to announce the general availability of Kong Insomnia 11! This release introduces third-party vault integrations for enhanced security, an all-new Git sync experience for more seamless collaboration, and support for multi-tabs to improve efficiency within the Insomnia application. Keep reading to learn more.

Strengthen Your Cloud Security With Snowflake's Trust Center

Snowflake’s Trust Center, now in general availability, delivers a unified way to identify, address, and monitor security risks. Discover how scanner packages (Security Essentials, CIS Benchmark, and more) streamline compliance checks, reduce costs, and simplify account security across multiple clouds. See how to configure scans, resolve vulnerabilities, and enforce best practices for user authentication, network policies, and more. Take a proactive approach to safeguarding sensitive data and learn how the Trust Center supports Snowflake’s shared security model.

Vulnerability Assessment vs Penetration Testing: Key Differences

Cyber threats are getting smarter, and businesses need to stay one step ahead. That’s where Vulnerability Assessments (VA) and Penetration Testing (PT) come in. Both play a crucial role in cybersecurity, but they’re not the same thing. Consider it this way: a vulnerability assessment is similar to a regular health check-up—it identifies potential problems early.

Uphold Children's Data Privacy With Our COPPA Compliance Checklist

If you are on the verge of launching a new app or service that involves the collection of children’s data, you might have missed one essential consideration: securing your COPPA compliance. If so, we recommend you immediately stop collecting and sharing children's data. Service providers not following the Children’s Online Privacy Protection Act (COPPA) rules will face major monetary and legal repercussions.

Protect Your Data With Self-Managed Keys (BYOK) Enhancements

In today’s rapidly evolving data security landscape, it’s critical for organizations to secure their services, particularly in the face of rising cyber threats. Robust security measures for streaming data are vital to safeguard against breaches and losses, and help to maintain trust among customers and partners, while ensuring compliance with regulatory requirements.