API Discovery
2:34
2 жыл бұрын
Dude, where are your APIs?
33:06
2 жыл бұрын
Пікірлер
@yurakundin
@yurakundin Күн бұрын
thank you for the root cause analysis and connecting it to the actual breach
@MichaelJosephBarton
@MichaelJosephBarton 12 күн бұрын
So true - have yet to find an enterprise customer who can answer the question with any level of accuracy.....
@jiri5867
@jiri5867 12 күн бұрын
hubspot.wallarm.com/hubfs/API%20Security%20Checklist.pdf
@FerrisBuller
@FerrisBuller 14 күн бұрын
Why is API asset management important for security?
@yurakundin
@yurakundin 16 күн бұрын
security checklist, very useful idea
@FerrisBuller
@FerrisBuller 18 күн бұрын
What are the key criteria organizations should focus on when securing their APIs, and how can AI help prioritize these efforts?
@WallarmChannel
@WallarmChannel 18 күн бұрын
The key criteria for securing APIs include strong authentication and authorization, encryption of data in transit and at rest, monitoring for anomalies, and protection against common vulnerabilities like injection attacks. AI can help prioritize these efforts by continuously analyzing API traffic, detecting potential threats, and learning from past incidents to improve security measures. AI-driven tools can also automate the identification of high-risk APIs, enabling faster response times and more efficient allocation of security resources.
@FerrisBuller
@FerrisBuller 18 күн бұрын
Why are API leaks becoming more frequent, and how can organizations prevent them?
@WallarmChannel
@WallarmChannel 18 күн бұрын
API leaks are becoming more frequent due to the growing number of APIs being deployed and the increasing complexity of API ecosystems. These leaks often occur when sensitive data is unintentionally exposed through poorly secured endpoints or misconfigurations. To prevent API leaks, organizations should enforce strict access controls, use encryption for data both in transit and at rest, and regularly audit their APIs for vulnerabilities. Implementing AI-powered tools for real-time monitoring can also help detect potential leaks early and mitigate risks before significant damage occurs.
@FerrisBuller
@FerrisBuller 18 күн бұрын
How do malicious API attacks differ from malformed API requests, and what strategies can be used to protect against both?
@WallarmChannel
@WallarmChannel 18 күн бұрын
Malicious API attacks are intentional attempts by attackers to exploit vulnerabilities, such as injecting malicious code or using stolen credentials. Malformed API requests, on the other hand, occur when the API functions correctly but is used in an unintended way, leading to potential data leaks or security breaches. To protect against both, organizations should implement strong input validation, use rate limiting, and apply AI-based monitoring to detect unusual behavior. Additionally, ensuring proper authentication and access controls can reduce the risk of both types of attacks.
@FerrisBuller
@FerrisBuller 18 күн бұрын
How does your organization handle the detection and management of Shadow and Zombie APIs?
@WallarmChannel
@WallarmChannel 18 күн бұрын
At Wallarm, we provide comprehensive API Discovery and protection tools that automatically detect and manage Shadow, Orphan, and Zombie APIs. Our platform helps organizations identify rogue APIs, assess their risks, and ensure they are properly secured or decommissioned to minimize attack surfaces.
@yurakundin
@yurakundin 18 күн бұрын
a very difficult concept well explained
@WallarmChannel
@WallarmChannel 18 күн бұрын
Thank you. I'm glad the explanation helped clarify these complex concepts! If you have any more questions or need further information, feel free to reach out.
@MichaelJosephBarton
@MichaelJosephBarton 18 күн бұрын
I like it - short and to the point.
@WallarmChannel
@WallarmChannel 18 күн бұрын
Thanks! We aim to keep it concise and informative. Glad you enjoyed it!
@RaymondKirk-l5v
@RaymondKirk-l5v 24 күн бұрын
Security is a enabler for the business !!
@WallarmChannel
@WallarmChannel 23 күн бұрын
Exactly! A strong security foundation not only protects but also empowers businesses to innovate and grow with confidence. Thanks for sharing your insight!
@tonysgonewild
@tonysgonewild 26 күн бұрын
I appreciate the direction being taken. Leveraging AI could not only enhance the identification of potential threats but also optimize the user interface to better suit individual preferences. Additionally, it could intelligently manage communication, including notifications, alerts, and status updates. So many use cases are possible now.
@WallarmChannel
@WallarmChannel 25 күн бұрын
Thank you for your thoughtful insights! You're absolutely right-AI has the potential to transform API security in many ways, from enhancing threat detection to optimizing user interfaces and managing communications more intelligently. At Wallarm, we're leveraging AI to provide advanced protection, including real-time threat detection and automated response capabilities, which help organizations stay ahead of emerging threats. The possibilities for AI in this space are indeed vast, and we're excited to be at the forefront of these advancements. Your engagement and ideas are greatly appreciated!
@FerrisBuller
@FerrisBuller 26 күн бұрын
Like!
@Artur_MB
@Artur_MB 26 күн бұрын
I know Tim Erlin makes cool stuff
@yurakundin
@yurakundin Ай бұрын
shadow API, is that the low hanging fruit for the perimeter
@WallarmChannel
@WallarmChannel Ай бұрын
Shadow APIs can indeed be considered low-hanging fruit when it comes to perimeter security, but they also pose significant hidden risks. These are APIs that are often undocumented or forgotten, making them easy targets for attackers since they might lack the security controls applied to well-known APIs. It's crucial to include shadow APIs in your security strategy by conducting regular inventory checks and monitoring all API traffic to identify and secure these potentially vulnerable entry points.
@Artur_MB
@Artur_MB Ай бұрын
Educational
@MatthewJones-e8v
@MatthewJones-e8v Ай бұрын
Informative! - Keep these going Wallarm. Great snippets to digest over a coffee.
@MichaelJosephBarton
@MichaelJosephBarton Ай бұрын
how about social security last week???? Everyday there is an API security problem....Crazy
@WallarmChannel
@WallarmChannel Ай бұрын
You're absolutely right-API security issues seem to be a daily occurrence, and it's a growing concern for many organizations. The Social Security breach last week is a stark reminder of how critical it is to protect sensitive data through secure API practices. The increasing frequency of these incidents highlights the importance of implementing robust API security measures, such as encryption, access controls, and regular security audits, to prevent data exposure. It's a crazy landscape out there, but with the right strategies, we can significantly reduce these risks.
@mikhailgruzdev4524
@mikhailgruzdev4524 Ай бұрын
Howard's doggie at 45:01 .
@MatthewJones-e8v
@MatthewJones-e8v Ай бұрын
On point! - Short, sharp, easy to understand and with no fluff. Love the background beat.
@adriannahunter1986
@adriannahunter1986 5 ай бұрын
'PromoSM'
@abhinaykatti8648
@abhinaykatti8648 Жыл бұрын
Thanks
@evermoregwatiwa8001
@evermoregwatiwa8001 Жыл бұрын
thanks bro, i like the video💯
@AE-nt3jj
@AE-nt3jj Жыл бұрын
You don't explain well and boring
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
hi
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
I like this
@zhiyongyao5697
@zhiyongyao5697 Жыл бұрын
Nice
@gary8777
@gary8777 Жыл бұрын
😋 P r o m o S M.
@victoriaramirez3022
@victoriaramirez3022 2 жыл бұрын
Thanks for the checklist, it is very useful
@victoriaramirez3022
@victoriaramirez3022 2 жыл бұрын
I'm sorry. I couldn't be on the live stream.
@powit
@powit 2 жыл бұрын
HI, Could you share in some place the rulesets used for reaching A that you show in your PDF report? Thanks in advancesda
@powit
@powit 2 жыл бұрын
@chrism Do you refer to the PDF in your video? I can't see here the OWASP rulesets you used for test sorry, I just wanted to use the same and test by myself. Regards and thanks in advance.
@powit
@powit 2 жыл бұрын
@chrism hi, thanks for the information, the issue here is that the gotestwaf do mention to owasp-api rules but I am not able to understand what kind of the is executed when gotestwaf do reference to this, there is not any owasp-api ruleset as I can see in owasp project.
@satyajitdas435
@satyajitdas435 2 жыл бұрын
informative !!
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻🤝🏻
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻🤝🏻
@dritec2010
@dritec2010 2 жыл бұрын
Tutorial incorrect. Not working for me. GKE 1.21
@satyajitdas435
@satyajitdas435 2 жыл бұрын
Informative 👍🏻
@FlyingZonda
@FlyingZonda 2 жыл бұрын
Great talk given by Raj. Many different takeaways for different types of stakeholders. Been waiting to share this with my colleagues! Thanks for posting it.
@ehro
@ehro 3 жыл бұрын
This guy is brilliant. Very articulate educator.
@easyappscompany
@easyappscompany 4 жыл бұрын
Best Regards From Mexico City. Manuel Silva EASYAPPSCOMPANY