Learn how to protect your RESTful APIs. In this week’s episode, I tell you all the collected API Security best practices. Don’t miss any upcoming episode and subscribe to the API-University channel on youtube. Learn about security and best practices
How to use the Facebook API and OAuth
Facebook has a popular API. To use the API, you need to get an OAuth Access Token first. In this week’s episode, I show you hands-on how to get both the OAuth token and how to call the API. Don’t miss any
How to use the LinkedIn API and OAuth
LinkedIn has a popular API. To use the API, you need to get an OAuth Access Token first. In this week’s episode, I show you hands-on how to get both the OAuth token and how to call the API. Don’t
The 10 most critical API security risks – Part 10: Insufficient Logging & Monitoring
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. API
The 10 most critical API security risks – Part 9: Improper Assets Management
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. API
The 10 most critical API security risks – Part 8: Injection
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. API
The 10 most critical API security risks – Part 7: Security Misconfiguration
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. In
The 10 most critical API security risks – Part 6: Mass Assignment
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. API
The 10 most critical API security risks – Part 5: Broken Function-Level Authorization
The recently published “OWASP API security top 10” report analyzes the anti-patterns that lead to vulnerabilities and security risks in APIs. In this 10 part series, we introduce these API anti-patterns. Every API professional should know about these anti-patterns. API
Is the API-key enough? API security issues and their fix
It can be seen over and over again: An API-key is directly embedded in the source code of an app. The most recent incident as of February 2020 is the Iowa caucus app, that contained an API-key right inside the