Twitter | Search | |
Search Refresh
Dan Raywood 17h
New live takes place in 2 hours, 6pm BST/10am PT looking at "How to Manage Attacks, Vulnerabilities & Complexities in APIs" with speakers and
Reply Retweet Like
Infosecurity Mag 2h
on how and standardization can amplify the spread of and increase the damage rendered by vulnerabilities
Reply Retweet Like
Dan Raywood 15h
"You send an API call, you can get full info. But look at attack methods, and over 90% of attack methods are not being addressed by current solutions" says Roey Eliyahu from
Reply Retweet Like
Dan Raywood 15h
Live in 10 minutes talking all things API security with and
Reply Retweet Like
Dan Raywood 15h
API security has the same vulnerabilities and issues as traditional security, so says
Reply Retweet Like
Dan Raywood 14h
Replying to @SaltSecurity
"If you add a password field, you can override the password... You can change password of any user and hack any account with an API call. This is a very common vulnerability and hard to detect and should not appear."
Reply Retweet Like
Dan Raywood 15h
"There's no UI natively for API, you pick the one you want" says Also points out generalized API endpoints, and missing anti-automation as common causes for sensitive information leakage.
Reply Retweet Like
Infosecurity Mag Jun 24
This discusses how to establish protection in a multi-cloud environment
Reply Retweet Like
Vidoc Razor Jun 22
Reply Retweet Like
EasylifeIT™ Jun 21
Daily digest of technology and security news from EasylifeIT™
Reply Retweet Like
Infosecurity Mag Jun 23
In this we discuss how to prevent an attacker from exploiting unique
Reply Retweet Like
Infosecurity Mag Jun 23
Find out what are the common pitfalls for multi-cloud and learn how to avoid them when you join this
Reply Retweet Like
Infosecurity Mag Jun 22
Learn how to reduce time and cost of your enterprise threat when you watch this Earn
Reply Retweet Like
Infosecurity Mag Jun 20
: Automating Your Security Response: The Next Step in Data Protection is now LIVE with & Join us now.
Reply Retweet Like
Infosecurity Mag Jun 20
Vote LIVE on : How much do you currently use as part of your strategies? Join this discussion with
Reply Retweet Like