Dozens of masterclasses taught by the people who know API security best
API security focuses on addressing the possible consequences of direct interactions between the API and malicious hackers.
An advanced testing method focusing on testing the production environment and analyzing application security at runtime.
A white box methodology for testing that analyzes application source code before it is compiled for security vulnerabilities.
An automated process which scans open source software and identifies precisely what has been used in a piece of software.
OWASP classifies each API security threat by exploitability, weakness prevalence, weakness detectability and technical impact.
An API gateway acts as a reverse proxy, sitting between a collection of backend services and a client.
A security device that makes up part of a comprehensive cybersecurity strategy designed to protect at the application level.
The OpenAPI Specification (OAS), a technical specification that describes REST APIs.
How does Noname's API Security Platform compare to a Runtime Protection-only solution?
Why are WAFs and Gateways unable to adequately protect APIs?
How does Noname's API Security Platform compare to a Testing-only solution?
Discover how Noname ranks against to traditional application security solutions.
Application programmable interfaces, or APIs, are hot topic in technology circles. But what is an API and what do they do?
Discover why Broken Object Level Authorization is the top vulnerability on the list of OWASP API Threats.
Explore the three core focus areas for API security best practices: API security testing, API discovery, and runtime protection.
Discover the most common and effective countermeasures for securing your RES APIs.
Learn what business logic is and why many applications rely entirely on business logic in order to work correctly.
Securing application programming interfaces (APIs) is a challenging workload. Use this checklist of recommended best practices to protect your APIs.
Created by Facebook engineers in 2015, GraphQL has since become popular among developers working on large-scale web applications. Learn why here.
Learn what microservices are, how they help to improve application functionality, and enable developers to more easily create and maintain software applications.
Learn how the right plans can help you continue its operations in the event of a major disruption, such as a natural disaster or security incident.
Learn what an API call is, what the most common types of API calls are, as well as how to protect them.
Discover what a denial of service attack is, the types of attacks, how they are conducted, and how to protect yourself against one in this article.
Discover the difference between API security testing tools and traditional application security solutions.