Strategies for API Security

January 6, 2016

The explosion in consumer mobile adoption, computerization of goods and services, and an increase in data generation have driven a change in the way Internet-based businesses are built and consumed. The digital economy has prompted online organizations to facilitate the creation and exchange of information to new channels, partners, and developers with the goal of unlocking new business value for these consumers. Today, connecting businesses to their cross-channel customers is technically driven by Application Programming Interfaces, or APIs. This white paper explores strategies for protecting APIs by first introducing how APIs are designed, and how similarities between web applications and APIs mark these endpoints as added targets for web attackers.

Spotlight

New Context

New Context is an innovator in the security of data for highly regulated industries including energy, telecommunications, finance and retail. We provide consulting services and build tools that help our customers around the globe prepare for security orchestration, building critical infrastructure that works with emerging tech. Drawing on our years of experience working with clients in the enterprise and industrial internet, New Context is developing tools that integrate security into software development holistically. Our Lean Security Intelligence Platform (LS/IQ) is a new approach to cybersecurity for the enterprise - creating a strategic roadmap optimizing development resources for security, speed and regulatory compliance. Contact us to learn if LS/IQ is available for your organization.

OTHER WHITEPAPERS
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

The Economic Impact of Cyber Attacks

whitePaper | December 29, 2022

Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.

Read More

Spotlight

New Context

New Context is an innovator in the security of data for highly regulated industries including energy, telecommunications, finance and retail. We provide consulting services and build tools that help our customers around the globe prepare for security orchestration, building critical infrastructure that works with emerging tech. Drawing on our years of experience working with clients in the enterprise and industrial internet, New Context is developing tools that integrate security into software development holistically. Our Lean Security Intelligence Platform (LS/IQ) is a new approach to cybersecurity for the enterprise - creating a strategic roadmap optimizing development resources for security, speed and regulatory compliance. Contact us to learn if LS/IQ is available for your organization.

Events