Пікірлер
@elenaastrahanceva6190
@elenaastrahanceva6190 14 күн бұрын
Wallarm API 👍👍
@TroyGotCode
@TroyGotCode 21 күн бұрын
once i finish my war on jquery, graphql is next
@R00kTruth
@R00kTruth 26 күн бұрын
Suppose it comes down to personal preference, sometimes you just need something quick and easy and other times, you may just need something that you can implement into 3rd party software, I've never needed to use these types of api's untill recently, i went with flask for prototyping, mainly because I find it simple, easy to program in/around in and implement it in many different, As someone already pointed out, you could literally route one api to many. for the project I am currently working, I have a auto-route function, that'll create the api apon request (depending on the GET/POST.. etc) anyways thanks for the vid
@WallarmChannel
@WallarmChannel 25 күн бұрын
Thanks for sharing your experience! Glad you found the video helpful, and thanks again for your input!
@VerbalMurderGaming
@VerbalMurderGaming 26 күн бұрын
I mean, or you can just design a RESTful API that doesnt have a bazillion endpoints...
@WallarmChannel
@WallarmChannel 26 күн бұрын
Good point! You can definitely design a well-structured RESTful API with fewer, more versatile endpoints. REST APIs can be highly efficient if they are thoughtfully designed, avoiding an overwhelming number of endpoints. However, GraphQL offers a different kind of flexibility by allowing clients to request exactly the data they need in a single query, which can reduce the need for multiple requests in complex applications. This flexibility is especially useful for applications with rapidly evolving data needs, but it comes with its own security and complexity trade-offs.
@ungrim97
@ungrim97 27 күн бұрын
? GraphQL just provided a standised syntax for getting all that data, you can have your REST endpoint do whateever you want. What GraphQL however is really good at, is making it super easier for an attacker to DDOS you by requesting huge data sets
@WallarmChannel
@WallarmChannel 26 күн бұрын
You’re absolutely right! While GraphQL does provide a standardized syntax for querying data, it does come with its own set of challenges, especially when it comes to security. One of the key risks, as you mentioned, is the potential for DoS (Denial of Service) attacks. Attackers can exploit the flexibility of GraphQL by sending deeply nested or overly complex queries, which can overwhelm the server by requesting massive amounts of data in a single query. To mitigate this, it's crucial to implement security measures such as query complexity analysis, query depth limitations, and batching limits. These can help prevent overloading your server with resource-intensive requests. Securing GraphQL effectively requires a combination of these safeguards to ensure that its power and flexibility don’t become a vulnerability. Thanks for highlighting this important point! If you’re interested in learning more about GraphQL security, feel free to check out our full webinar where we dive deeper into these risks: kzbin.info/www/bejne/m16WYmiYec54p6M
@GaryRichardson-x9x
@GaryRichardson-x9x Ай бұрын
Jones Sharon White Anna Johnson Jason
@yurakundin
@yurakundin Ай бұрын
thank you for the root cause analysis and connecting it to the actual breach
@MichaelJosephBarton
@MichaelJosephBarton 2 ай бұрын
So true - have yet to find an enterprise customer who can answer the question with any level of accuracy.....
@jiri5867
@jiri5867 2 ай бұрын
hubspot.wallarm.com/hubfs/API%20Security%20Checklist.pdf
@FerrisBuller
@FerrisBuller 2 ай бұрын
Why is API asset management important for security?
@yurakundin
@yurakundin 2 ай бұрын
security checklist, very useful idea
@FerrisBuller
@FerrisBuller 2 ай бұрын
What are the key criteria organizations should focus on when securing their APIs, and how can AI help prioritize these efforts?
@WallarmChannel
@WallarmChannel 2 ай бұрын
The key criteria for securing APIs include strong authentication and authorization, encryption of data in transit and at rest, monitoring for anomalies, and protection against common vulnerabilities like injection attacks. AI can help prioritize these efforts by continuously analyzing API traffic, detecting potential threats, and learning from past incidents to improve security measures. AI-driven tools can also automate the identification of high-risk APIs, enabling faster response times and more efficient allocation of security resources.
@FerrisBuller
@FerrisBuller 2 ай бұрын
Why are API leaks becoming more frequent, and how can organizations prevent them?
@WallarmChannel
@WallarmChannel 2 ай бұрын
API leaks are becoming more frequent due to the growing number of APIs being deployed and the increasing complexity of API ecosystems. These leaks often occur when sensitive data is unintentionally exposed through poorly secured endpoints or misconfigurations. To prevent API leaks, organizations should enforce strict access controls, use encryption for data both in transit and at rest, and regularly audit their APIs for vulnerabilities. Implementing AI-powered tools for real-time monitoring can also help detect potential leaks early and mitigate risks before significant damage occurs.
@FerrisBuller
@FerrisBuller 2 ай бұрын
How do malicious API attacks differ from malformed API requests, and what strategies can be used to protect against both?
@WallarmChannel
@WallarmChannel 2 ай бұрын
Malicious API attacks are intentional attempts by attackers to exploit vulnerabilities, such as injecting malicious code or using stolen credentials. Malformed API requests, on the other hand, occur when the API functions correctly but is used in an unintended way, leading to potential data leaks or security breaches. To protect against both, organizations should implement strong input validation, use rate limiting, and apply AI-based monitoring to detect unusual behavior. Additionally, ensuring proper authentication and access controls can reduce the risk of both types of attacks.
@FerrisBuller
@FerrisBuller 2 ай бұрын
How does your organization handle the detection and management of Shadow and Zombie APIs?
@WallarmChannel
@WallarmChannel 2 ай бұрын
At Wallarm, we provide comprehensive API Discovery and protection tools that automatically detect and manage Shadow, Orphan, and Zombie APIs. Our platform helps organizations identify rogue APIs, assess their risks, and ensure they are properly secured or decommissioned to minimize attack surfaces.
@yurakundin
@yurakundin 2 ай бұрын
a very difficult concept well explained
@WallarmChannel
@WallarmChannel 2 ай бұрын
Thank you. I'm glad the explanation helped clarify these complex concepts! If you have any more questions or need further information, feel free to reach out.
@MichaelJosephBarton
@MichaelJosephBarton 2 ай бұрын
I like it - short and to the point.
@WallarmChannel
@WallarmChannel 2 ай бұрын
Thanks! We aim to keep it concise and informative. Glad you enjoyed it!
@RaymondKirk-l5v
@RaymondKirk-l5v 2 ай бұрын
Security is a enabler for the business !!
@WallarmChannel
@WallarmChannel 2 ай бұрын
Exactly! A strong security foundation not only protects but also empowers businesses to innovate and grow with confidence. Thanks for sharing your insight!
@tonysgonewild
@tonysgonewild 2 ай бұрын
I appreciate the direction being taken. Leveraging AI could not only enhance the identification of potential threats but also optimize the user interface to better suit individual preferences. Additionally, it could intelligently manage communication, including notifications, alerts, and status updates. So many use cases are possible now.
@WallarmChannel
@WallarmChannel 2 ай бұрын
Thank you for your thoughtful insights! You're absolutely right-AI has the potential to transform API security in many ways, from enhancing threat detection to optimizing user interfaces and managing communications more intelligently. At Wallarm, we're leveraging AI to provide advanced protection, including real-time threat detection and automated response capabilities, which help organizations stay ahead of emerging threats. The possibilities for AI in this space are indeed vast, and we're excited to be at the forefront of these advancements. Your engagement and ideas are greatly appreciated!
@FerrisBuller
@FerrisBuller 2 ай бұрын
Like!
@Artur_MB
@Artur_MB 2 ай бұрын
I know Tim Erlin makes cool stuff
@yurakundin
@yurakundin 2 ай бұрын
shadow API, is that the low hanging fruit for the perimeter
@WallarmChannel
@WallarmChannel 2 ай бұрын
Shadow APIs can indeed be considered low-hanging fruit when it comes to perimeter security, but they also pose significant hidden risks. These are APIs that are often undocumented or forgotten, making them easy targets for attackers since they might lack the security controls applied to well-known APIs. It's crucial to include shadow APIs in your security strategy by conducting regular inventory checks and monitoring all API traffic to identify and secure these potentially vulnerable entry points.
@Artur_MB
@Artur_MB 2 ай бұрын
Educational
@MatthewJones-e8v
@MatthewJones-e8v 2 ай бұрын
Informative! - Keep these going Wallarm. Great snippets to digest over a coffee.
@MichaelJosephBarton
@MichaelJosephBarton 2 ай бұрын
how about social security last week???? Everyday there is an API security problem....Crazy
@WallarmChannel
@WallarmChannel 2 ай бұрын
You're absolutely right-API security issues seem to be a daily occurrence, and it's a growing concern for many organizations. The Social Security breach last week is a stark reminder of how critical it is to protect sensitive data through secure API practices. The increasing frequency of these incidents highlights the importance of implementing robust API security measures, such as encryption, access controls, and regular security audits, to prevent data exposure. It's a crazy landscape out there, but with the right strategies, we can significantly reduce these risks.
@mikhailgruzdev4524
@mikhailgruzdev4524 2 ай бұрын
Howard's doggie at 45:01 .
@MatthewJones-e8v
@MatthewJones-e8v 2 ай бұрын
On point! - Short, sharp, easy to understand and with no fluff. Love the background beat.
@adriannahunter1986
@adriannahunter1986 6 ай бұрын
'PromoSM'
@abhinaykatti8648
@abhinaykatti8648 Жыл бұрын
Thanks
@evermoregwatiwa8001
@evermoregwatiwa8001 Жыл бұрын
thanks bro, i like the video💯
@AE-nt3jj
@AE-nt3jj Жыл бұрын
You don't explain well and boring
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
hi
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
I like this
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
Nice
@gary8777
@gary8777 Жыл бұрын
😋 P r o m o S M.
@victoriaramirez3022
@victoriaramirez3022 2 жыл бұрын
Thanks for the checklist, it is very useful
@victoriaramirez3022
@victoriaramirez3022 2 жыл бұрын
I'm sorry. I couldn't be on the live stream.
@powit
@powit 2 жыл бұрын
HI, Could you share in some place the rulesets used for reaching A that you show in your PDF report? Thanks in advancesda
@powit
@powit 2 жыл бұрын
@chrism Do you refer to the PDF in your video? I can't see here the OWASP rulesets you used for test sorry, I just wanted to use the same and test by myself. Regards and thanks in advance.
@powit
@powit 2 жыл бұрын
@chrism hi, thanks for the information, the issue here is that the gotestwaf do mention to owasp-api rules but I am not able to understand what kind of the is executed when gotestwaf do reference to this, there is not any owasp-api ruleset as I can see in owasp project.
@satyajitdas435
@satyajitdas435 2 жыл бұрын
informative !!
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻🤝🏻
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻🤝🏻
@dritec2010
@dritec2010 2 жыл бұрын
Tutorial incorrect. Not working for me. GKE 1.21
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻
@FlyingZonda
@FlyingZonda 3 жыл бұрын
Great talk given by Raj. Many different takeaways for different types of stakeholders. Been waiting to share this with my colleagues! Thanks for posting it.
@ehro
@ehro 3 жыл бұрын
This guy is brilliant. Very articulate educator.
@easyappscompany
@easyappscompany 4 жыл бұрын
Best Regards From Mexico City. Manuel Silva EASYAPPSCOMPANY