Systems | Development | Analytics | API | Testing

Supplement API Security Testing with Functional API Testing and Integration Testing

The OWASP API Security Top 10 identifies the top API vulnerabilities that pose the greatest risk to mobile, web and SaaS applications as well as internal, partner and external API programs, highlighting which vulnerabilities must be detected and mitigated promptly. Gartner predicts that APIs that expose private information such as Personally Identifiable Information (PII) will be the most common attack vector in 2022.

Building a Next-Gen API Platform with the All-New Choreo Connect Microgateway, WSO2 Webinar

Microservices have become the de facto standard in modern application architecture. Modern application workloads are spread among several groups of microservices, cloud services, and legacy services. Kubernetes has become the industry standard for deploying microservices, with service meshes allowing developers to isolate and control service-to-service connections. Choreo Connect is an API microgateway that is cloud-native, open-source, and developer-focused. It offers first-rate Kubernetes support while supporting a variety of API management quality of services (QoS), such as message security rate-limiting, observability, and message mediation.

Monitoring Appian with Appian: Lessons from Automating Security Response

In our previous blog posts, we’ve covered the core components, orchestration capabilities and automated analysis and ChatOps features in our in-house Security Orchestration, Automation & Response (SOAR) application. In this final blog post, we will briefly cover one of the system’s automated response capabilities that allow it to take action and respond to alerts without human intervention, and close out the blog series with two important lessons learned from implementing SOAR at Appian.

What Is Sound Static Analysis?

Sound static analysis is a beneficial practice when developing software that needs to be safe, secure, and compliant. Here we discuss what makes sound analysis different, in terms of static analysis, why it is important, and how sound static code analysis works. Read along or jump ahead to the section that interests you the most: ➡️ Sound static analysis Free Trial.

Netlify Identity protects Ably apps from hacks

A few weeks ago I saw this message in our internal support channel on Slack, and it made my gears grind. So I stopped to take a look, since the last thing we want is a customer taken advantage of. There are people out there on the internet cheeky enough to freeload off your account, and use up your monthly quotas. What's more: you may not know that it is happening.

API Security In an Agile World: Here's What You Need to Know

The rise of web services creates many challenges that companies must address to avoid data breaches. Companies are embracing the power of APIs to extend their business capabilities. However, they began adopting them so quickly, security didn’t get as much attention as it deserved. Many organizations are now taking a strong look at API security to avoid being the next victim of a data breach. Here’s our take on security and what you can do to address it in your company.

A Guide to Secure Elixir Package Updates

Keeping your dependencies up-to-date is essential to ensure that your applications stay healthy, secure, and performant. Thankfully, the BEAM ecosystem has its own package manager, Hex, which is fast, mature, and simple to use. This article explores the available tools and commands to manage Hex dependencies and some tips to make the process more enjoyable. Let's dive in!