Mike ElissenforSecurity Level Upsecuritylevelup.hashnode.net·Mar 21, 2023Managing API Sprawl: Best Practices and Real-World Examples from a Senior API DeveloperAPI sprawl is a growing concern for developers and organizations alike, as the number of APIs used in modern applications continues to skyrocket. With so many APIs in play, it can be challenging to manage them all effectively and ensure they are secu...Discuss·11 likes·63 readsAPIs
Mike ElissenforSecurity Level Upsecuritylevelup.hashnode.net·Aug 11, 2022How hackers can manipulate your API microserviceshttps://www.youtube.com/watch?v=u57A-pZLpvY&list=PLTnRtjQN5iebEDsDmIqpqtXHiI5F_Sqaf&index=3 Time to continue our journey on 'Fundamentals of API Security' and take a look at how hackers can manipulate your API microservices, often leading to financia...Discuss·7 likes·300 readsAPIs
Andrew MartinezforOpenZiti Tech Blogopenziti.hashnode.net·Dec 1, 2022NGINX & ZeroTrust API SecurityWith the first version of ngx_ziti_module, it is possible to take an NGINX-exposed Web API and make it completely dark. This means no open ports in NGINX, and it brings the Zero Trust capabilities of OpenZiti to any NGINX deployment. Yes, replace ope...Discuss·3 likes·2.2K readszerotrust
Faris MohamedforFaris Mohamed's Blogfarismohamed.hashnode.net·Apr 3, 2023The Fundamentals of API Security: How to Keep Your APIs Safe and SecureIn today's digital age, APIs are a critical component of web applications. They allow different systems to communicate with each other, making it possible for developers to create complex and innovative applications. However, with this increased conn...Discuss·78 readsAPIs
ibukun soremekunforIbukun Soremekunibukunsoremekun.hashnode.net·Mar 25, 2023API Security Best PracticesIn today's interconnected digital world, Application Programming Interfaces (APIs) play a crucial role in enabling seamless integration between various software applications, services, and platforms. APIs act as a bridge between different systems, al...Discuss·26 readsapi
Mike ElissenforSecurity Level Upsecuritylevelup.hashnode.net·Mar 21, 2023Managing API Sprawl: Best Practices and Real-World Examples from a Senior API DeveloperAPI sprawl is a growing concern for developers and organizations alike, as the number of APIs used in modern applications continues to skyrocket. With so many APIs in play, it can be challenging to manage them all effectively and ensure they are secu...Discuss·11 likes·63 readsAPIs
Kunal KushwahaforWeMakeDevskubeworld.hashnode.net·Mar 10, 2023API security automation: Secure your APIs before deployingAPI security As organizations move to a microservice-based architecture, the number of APIs used in testing and production environments rapidly increases. This provides several benefits such as efficient application scaling, but at the same time, the...Discuss·1 like·132 readsCase studiesWeMakeDevs
Ian OkonuforOkonuokonu.hashnode.net·Mar 7, 2023Securing APIs through proper Cache Management using RedisAPIs provide a way for different applications to communicate with each other and exchange data. However, APIs can also be a target for attackers who seek to exploit vulnerabilities in the system. To prevent these attacks, it is essential to implement...Discuss·1 likeAPIs
Abhiney SharmaforCyberSecSimplifycybersecsimplify.hashnode.net·Feb 20, 2023API Security Best PracticesAs an aspiring API Security Analyst, you understand the importance of securing APIs to prevent attacks that can lead to data breaches and other cybersecurity threats. To help you protect APIs, we have created a comprehensive blog on Hacking APIs that...Discuss·85 readsAPIs
Mike ElissenforSecurity Level Upsecuritylevelup.hashnode.net·Feb 7, 2023The Fundamentals of API SecurityWorking as a Developer Advocate @ Akamai Technologies has allowed me to see the rise of microservices and APIs in the industry up close. Consulting and collaborating with companies who shifted their traditional web stacks over to a microservices arch...Discuss·2 likes·107 readsAPIs
Daniel WagnerforWagnuswagnus.hashnode.net·Feb 5, 2023Realms and users - Part 3In this post, we will look at realms and users in Keycloak. Before we start creating these things, we should familiarize ourselves with these terms from the Keycloak universe. What is a realm? A realm is a logical boundary that represents a set of us...DiscussSecure applications with Keycloakkeycloak
Daniel WagnerforWagnuswagnus.hashnode.net·Feb 4, 2023Getting started with Keycloak - Part 2In this post, we will look at how to start the Keycloak server on your local machine in developer mode. This developer mode is not suitable or intended for use in a production environment. However, it is perfectly sufficient for our first experiments...Discuss·26 readsSecure applications with Keycloakkeycloak
Daniel WagnerforWagnuswagnus.hashnode.net·Feb 4, 2023Introduction to Keycloak - Part 1Keycloak is an open-source identity and access management solution from Red Hat that provides a centralized platform for authentication and authorization. It acts as a Single Sign-On (SSO) solution for web and mobile applications and also provides se...DiscussSecure applications with KeycloakSecurity