Whitepaper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs Download Now  

Resources

Discover new API Security resources, ranging from reports and eBooks to webinars and speaking gigs.

Type:

Whitepaper

API Security 101

When it comes to securing APIs, traditional application security controls are not a complete solution.

Download Now  

Product Brief

The Enterprise-Grade API Security Platform

Discover the Noname Security Platform and our approach to API security.

Download Now  

Whitepaper

Hacking Banks and Cryptocurrency Exchanges Through Their APIs

Research by Alissa Knight, former hacker, current CISO and researcher.

Download now  

Video

API Security 101: The Why, Who, and How to Secure this Top Attack Surface

Get the basics about this top attack surface including 6 Steps to API Security.

Watch Now  

Ebook

The D.A.R.T. Strategy for API Security

Given the increased reliance of APIs, organizations need a proven strategy for API security.

Download Now  

Video

Are you safe from OWASP #11?

With so much focus on the OWASP 10, what about #11? Learn how to jump the API security shark.

Watch Now  

Blog

Enterprise API Security: Why Enterprises Need A Proactive Approach

Enterprise API security is a top priority for any business using api and digital transformation solutions.

Read Now  

Video

APIs Driving The Next Wave of Payments Innovation

Get the lowdown on how APIs are disrupting digital payments innovation in 2021 and beyond.

Watch Now  

Product Brief

API Security For M2M APIs

Securing M2M APIs and internal traffic is just as important as protecting against external attacks.

Download Now  

Blog

API Security Predictions 2022: The Good, the Bad, and the Scary

As we bring in 2022 and finish grappling with Log4j, we must also look ahead to what fortunes 2022 may bring us.

Read Now  

Blog

API Security 101 – 6 Things You Need to Know

How do you secure your organization’s APIs? Here are 6 key takeaways on API security.

Read Now  

Product Brief

API Security for the Financial Services Industry

APIs are at the heart of these digital strategies for both the Financial Services firms and their partners in Fintech.

Download Now  

Blog

3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”

Ethical hacker Alissa Knight opened the eyes of the banking industry.

Read Now  

Blog

Effective API Security is a Process, Not a Product

What makes API security so different that it requires a process, not just a product?

Read Now  

Blog

The API Estate

The quantity, nature, and extent of interest that APIs have on the computing environment.

Read Now  

Blog

The Fourth Pillar of API Security — Testing

Testing should not be a “one and done” exercise. In fact, it needs to span the lifecycle.

Read Now  

Blog

5 Reasons Enterprises Fail at Closing API Security Gaps

Let’s explore 5 of the most common reasons enterprises fail at closing API security gaps.

Read Now  

Blog

Remediate — The Third Pillar in the API Security Strategy

If remediation is done right, it can often be automated — a much more mature API security model.

Read Now  

Blog

Analyze — The Second Pillar in the API Security Strategy

The process of analyzing APIs involves more than searching for anomalies or exploits in API traffic.

Read Now  

Blog

API Security — Why API Discovery Matters

Simply knowing that an API exists doesn’t improve your security posture. Who is accessing each API?

Read Now  

Blog

Demystify API Security Threats and Vulnerabilities

Attackers are only one threat, there are other API security vulnerabilities to consider.

Read Now  

Blog

Experian and Peloton API Leak Prove APIs Are a Ticking Time Bomb

Experian API exposed credit scores of most Americans and Peloton API shared rider’s private data.

Read Now  

Blog

API Security 101: Look for Value, Not Buzzwords and Promises

Here is what you should know.

Read Now  

Blog

Breaking Formation: API Vulnerability in the AWS CloudFormation API

BreakingFormation is an XXE vulnerability (XML external entity injection) in the AWS API.

Read Now  

Blog

‘Tis the Season for API Vulnerabilities: First Log4j, Now WordPress

The first AIOSEO vulnerability is a privilege escalation that is due to broken authorization in the AIOSEO plugin’s REST API paths.

Read Now  

Blog

Log4j Vulnerabilities: APIs Causing Massive Risk Exposure

In this post, we will provide a quick overview of Log4Shell and recommendations for cyber security teams.

Read Now  

Blog

Active Testing: Runtime Detection for Log4j Vulnerability in APIs

Many Noname Security customers have been successfully using our Active Testing functionality.

Read Now  

Blog

A Look at the Evolution of APIs and Security in the Software Supply Chain

APIs act as the digital intermediary between the supply chain environment and applications.

Read Now