Suppose it comes down to personal preference, sometimes you just need something quick and easy and other times, you may just need something that you can implement into 3rd party software, I've never needed to use these types of api's untill recently, i went with flask for prototyping, mainly because I find it simple, easy to program in/around in and implement it in many different, As someone already pointed out, you could literally route one api to many. for the project I am currently working, I have a auto-route function, that'll create the api apon request (depending on the GET/POST.. etc) anyways thanks for the vid
@WallarmChannel25 күн бұрын
Thanks for sharing your experience! Glad you found the video helpful, and thanks again for your input!
@VerbalMurderGaming26 күн бұрын
I mean, or you can just design a RESTful API that doesnt have a bazillion endpoints...
@WallarmChannel26 күн бұрын
Good point! You can definitely design a well-structured RESTful API with fewer, more versatile endpoints. REST APIs can be highly efficient if they are thoughtfully designed, avoiding an overwhelming number of endpoints. However, GraphQL offers a different kind of flexibility by allowing clients to request exactly the data they need in a single query, which can reduce the need for multiple requests in complex applications. This flexibility is especially useful for applications with rapidly evolving data needs, but it comes with its own security and complexity trade-offs.
@ungrim9727 күн бұрын
? GraphQL just provided a standised syntax for getting all that data, you can have your REST endpoint do whateever you want. What GraphQL however is really good at, is making it super easier for an attacker to DDOS you by requesting huge data sets
@WallarmChannel26 күн бұрын
You’re absolutely right! While GraphQL does provide a standardized syntax for querying data, it does come with its own set of challenges, especially when it comes to security. One of the key risks, as you mentioned, is the potential for DoS (Denial of Service) attacks. Attackers can exploit the flexibility of GraphQL by sending deeply nested or overly complex queries, which can overwhelm the server by requesting massive amounts of data in a single query. To mitigate this, it's crucial to implement security measures such as query complexity analysis, query depth limitations, and batching limits. These can help prevent overloading your server with resource-intensive requests. Securing GraphQL effectively requires a combination of these safeguards to ensure that its power and flexibility don’t become a vulnerability. Thanks for highlighting this important point! If you’re interested in learning more about GraphQL security, feel free to check out our full webinar where we dive deeper into these risks: kzbin.info/www/bejne/m16WYmiYec54p6M
@GaryRichardson-x9xАй бұрын
Jones Sharon White Anna Johnson Jason
@yurakundinАй бұрын
thank you for the root cause analysis and connecting it to the actual breach
@MichaelJosephBarton2 ай бұрын
So true - have yet to find an enterprise customer who can answer the question with any level of accuracy.....
Why is API asset management important for security?
@yurakundin2 ай бұрын
security checklist, very useful idea
@FerrisBuller2 ай бұрын
What are the key criteria organizations should focus on when securing their APIs, and how can AI help prioritize these efforts?
@WallarmChannel2 ай бұрын
The key criteria for securing APIs include strong authentication and authorization, encryption of data in transit and at rest, monitoring for anomalies, and protection against common vulnerabilities like injection attacks. AI can help prioritize these efforts by continuously analyzing API traffic, detecting potential threats, and learning from past incidents to improve security measures. AI-driven tools can also automate the identification of high-risk APIs, enabling faster response times and more efficient allocation of security resources.
@FerrisBuller2 ай бұрын
Why are API leaks becoming more frequent, and how can organizations prevent them?
@WallarmChannel2 ай бұрын
API leaks are becoming more frequent due to the growing number of APIs being deployed and the increasing complexity of API ecosystems. These leaks often occur when sensitive data is unintentionally exposed through poorly secured endpoints or misconfigurations. To prevent API leaks, organizations should enforce strict access controls, use encryption for data both in transit and at rest, and regularly audit their APIs for vulnerabilities. Implementing AI-powered tools for real-time monitoring can also help detect potential leaks early and mitigate risks before significant damage occurs.
@FerrisBuller2 ай бұрын
How do malicious API attacks differ from malformed API requests, and what strategies can be used to protect against both?
@WallarmChannel2 ай бұрын
Malicious API attacks are intentional attempts by attackers to exploit vulnerabilities, such as injecting malicious code or using stolen credentials. Malformed API requests, on the other hand, occur when the API functions correctly but is used in an unintended way, leading to potential data leaks or security breaches. To protect against both, organizations should implement strong input validation, use rate limiting, and apply AI-based monitoring to detect unusual behavior. Additionally, ensuring proper authentication and access controls can reduce the risk of both types of attacks.
@FerrisBuller2 ай бұрын
How does your organization handle the detection and management of Shadow and Zombie APIs?
@WallarmChannel2 ай бұрын
At Wallarm, we provide comprehensive API Discovery and protection tools that automatically detect and manage Shadow, Orphan, and Zombie APIs. Our platform helps organizations identify rogue APIs, assess their risks, and ensure they are properly secured or decommissioned to minimize attack surfaces.
@yurakundin2 ай бұрын
a very difficult concept well explained
@WallarmChannel2 ай бұрын
Thank you. I'm glad the explanation helped clarify these complex concepts! If you have any more questions or need further information, feel free to reach out.
@MichaelJosephBarton2 ай бұрын
I like it - short and to the point.
@WallarmChannel2 ай бұрын
Thanks! We aim to keep it concise and informative. Glad you enjoyed it!
@RaymondKirk-l5v2 ай бұрын
Security is a enabler for the business !!
@WallarmChannel2 ай бұрын
Exactly! A strong security foundation not only protects but also empowers businesses to innovate and grow with confidence. Thanks for sharing your insight!
@tonysgonewild2 ай бұрын
I appreciate the direction being taken. Leveraging AI could not only enhance the identification of potential threats but also optimize the user interface to better suit individual preferences. Additionally, it could intelligently manage communication, including notifications, alerts, and status updates. So many use cases are possible now.
@WallarmChannel2 ай бұрын
Thank you for your thoughtful insights! You're absolutely right-AI has the potential to transform API security in many ways, from enhancing threat detection to optimizing user interfaces and managing communications more intelligently. At Wallarm, we're leveraging AI to provide advanced protection, including real-time threat detection and automated response capabilities, which help organizations stay ahead of emerging threats. The possibilities for AI in this space are indeed vast, and we're excited to be at the forefront of these advancements. Your engagement and ideas are greatly appreciated!
@FerrisBuller2 ай бұрын
Like!
@Artur_MB2 ай бұрын
I know Tim Erlin makes cool stuff
@yurakundin2 ай бұрын
shadow API, is that the low hanging fruit for the perimeter
@WallarmChannel2 ай бұрын
Shadow APIs can indeed be considered low-hanging fruit when it comes to perimeter security, but they also pose significant hidden risks. These are APIs that are often undocumented or forgotten, making them easy targets for attackers since they might lack the security controls applied to well-known APIs. It's crucial to include shadow APIs in your security strategy by conducting regular inventory checks and monitoring all API traffic to identify and secure these potentially vulnerable entry points.
@Artur_MB2 ай бұрын
Educational
@MatthewJones-e8v2 ай бұрын
Informative! - Keep these going Wallarm. Great snippets to digest over a coffee.
@MichaelJosephBarton2 ай бұрын
how about social security last week???? Everyday there is an API security problem....Crazy
@WallarmChannel2 ай бұрын
You're absolutely right-API security issues seem to be a daily occurrence, and it's a growing concern for many organizations. The Social Security breach last week is a stark reminder of how critical it is to protect sensitive data through secure API practices. The increasing frequency of these incidents highlights the importance of implementing robust API security measures, such as encryption, access controls, and regular security audits, to prevent data exposure. It's a crazy landscape out there, but with the right strategies, we can significantly reduce these risks.
@mikhailgruzdev45242 ай бұрын
Howard's doggie at 45:01 .
@MatthewJones-e8v2 ай бұрын
On point! - Short, sharp, easy to understand and with no fluff. Love the background beat.
@adriannahunter19866 ай бұрын
'PromoSM'
@abhinaykatti8648 Жыл бұрын
Thanks
@evermoregwatiwa8001 Жыл бұрын
thanks bro, i like the video💯
@AE-nt3jj Жыл бұрын
You don't explain well and boring
@zhiyongyao5697 Жыл бұрын
hi
@zhiyongyao5697 Жыл бұрын
I like this
@zhiyongyao5697 Жыл бұрын
Nice
@gary8777 Жыл бұрын
😋 P r o m o S M.
@victoriaramirez30222 жыл бұрын
Thanks for the checklist, it is very useful
@victoriaramirez30222 жыл бұрын
I'm sorry. I couldn't be on the live stream.
@powit2 жыл бұрын
HI, Could you share in some place the rulesets used for reaching A that you show in your PDF report? Thanks in advancesda
@powit2 жыл бұрын
@chrism Do you refer to the PDF in your video? I can't see here the OWASP rulesets you used for test sorry, I just wanted to use the same and test by myself. Regards and thanks in advance.
@powit2 жыл бұрын
@chrism hi, thanks for the information, the issue here is that the gotestwaf do mention to owasp-api rules but I am not able to understand what kind of the is executed when gotestwaf do reference to this, there is not any owasp-api ruleset as I can see in owasp project.
@satyajitdas4352 жыл бұрын
informative !!
@satyajitdas4352 жыл бұрын
Informative 👍🏻🤝🏻
@satyajitdas4352 жыл бұрын
Informative 👍🏻🤝🏻
@dritec20102 жыл бұрын
Tutorial incorrect. Not working for me. GKE 1.21
@satyajitdas4352 жыл бұрын
Informative 👍🏻
@FlyingZonda3 жыл бұрын
Great talk given by Raj. Many different takeaways for different types of stakeholders. Been waiting to share this with my colleagues! Thanks for posting it.
@ehro3 жыл бұрын
This guy is brilliant. Very articulate educator.
@easyappscompany4 жыл бұрын
Best Regards From Mexico City. Manuel Silva EASYAPPSCOMPANY