OWASP API Security Top 10 Webinar
In recent years, large reputable companies such as Facebook, Google and Equifax have suffered major data breaches that combined exposed the personal information of hundreds of millions of people worldwide. The common vector linking these breaches – APIs. The scale and magnitude of these breaches are the reason API security has been launched into the forefront of enterprise security concerns – now forcing us to rethink the way we approach API security as a whole.
OWASP Top 10 project has for a long time been the standard list of top vulnerabilities to look for and mitigate in the world of web applications.
APIs represent a significantly different set of threats, attack vectors, and security best practices. This caused the OWASP community to launch OWASP API Security project earlier this year.
In this session we’ll discuss:
· What makes API Security different from web application security
· The OWASP API Security Top 10
· Real world breaches and mitigation strategies for each of the risks
🔴 Subscribe for more webinars on API security: https://www.youtube.com/c/42Crunch?sub_confirmation=1
✅ Webinar Follow-up and Free API Security Tools:
Webinar Follow-up Materials: https://42crunch.com/webinar-owasp-api-security-top-10/
OpenAPI Encyclopedia: https://apisecurity.io/encyclopedia/content/api-security-encyclopedia.htm
API Security News: https://apisecurity.io/
Free API Security tools: https://42crunch.com/resources-free-tools/
✅ OWASP API Security Top 10 Tools:
42Crunch OWASP Solutions Matrix: https://info.42crunch.com/owasp-api-security-solution-matrix-yt
OWASP API Security Top 10 Cheat Sheet: https://info.42crunch.com/owasp-api-security-top-10-cs-youtube
✅Keep up with 42Crunch:
LINKEDIN: https://www.linkedin.com/company/42crunch
TWITTER: https://twitter.com/42crunch
FACEBOOK: https://www.facebook.com/42crunch
Видео OWASP API Security Top 10 Webinar канала 42Crunch
OWASP Top 10 project has for a long time been the standard list of top vulnerabilities to look for and mitigate in the world of web applications.
APIs represent a significantly different set of threats, attack vectors, and security best practices. This caused the OWASP community to launch OWASP API Security project earlier this year.
In this session we’ll discuss:
· What makes API Security different from web application security
· The OWASP API Security Top 10
· Real world breaches and mitigation strategies for each of the risks
🔴 Subscribe for more webinars on API security: https://www.youtube.com/c/42Crunch?sub_confirmation=1
✅ Webinar Follow-up and Free API Security Tools:
Webinar Follow-up Materials: https://42crunch.com/webinar-owasp-api-security-top-10/
OpenAPI Encyclopedia: https://apisecurity.io/encyclopedia/content/api-security-encyclopedia.htm
API Security News: https://apisecurity.io/
Free API Security tools: https://42crunch.com/resources-free-tools/
✅ OWASP API Security Top 10 Tools:
42Crunch OWASP Solutions Matrix: https://info.42crunch.com/owasp-api-security-solution-matrix-yt
OWASP API Security Top 10 Cheat Sheet: https://info.42crunch.com/owasp-api-security-top-10-cs-youtube
✅Keep up with 42Crunch:
LINKEDIN: https://www.linkedin.com/company/42crunch
TWITTER: https://twitter.com/42crunch
FACEBOOK: https://www.facebook.com/42crunch
Видео OWASP API Security Top 10 Webinar канала 42Crunch
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![From the OWASP Top Ten(s) to the OWASP ASVS - Jim Manico](https://i.ytimg.com/vi/CCIO3GOaFe0/default.jpg)
![APIs for Beginners - How to use an API (Full Course / Tutorial)](https://i.ytimg.com/vi/GZvSYJDk-us/default.jpg)
![OWASP Top 10: Injection Attacks](https://i.ytimg.com/vi/rWHvp7rUka8/default.jpg)
![OAuth, JWT, HMAC, oh my! API security for your enterprise](https://i.ytimg.com/vi/NtAnyDJhkkg/default.jpg)
![](https://i.ytimg.com/vi/5LdPseB-0hI/default.jpg)
![What Can Attackers Do With API Vulnerabilities - API Security With A Pinch Of Salt](https://i.ytimg.com/vi/6tbeGqjk8e4/default.jpg)
![LOSING MY RELIGION: Successful and unsuccessful approaches to API Security in a global enterprise](https://i.ytimg.com/vi/nzR6Itl6XXw/default.jpg)
![How to Build an Effective API Security Strategy](https://i.ytimg.com/vi/D7AfQKxFC0U/default.jpg)
![Introduction to Salt Security](https://i.ytimg.com/vi/l6nFl9c8mSU/default.jpg)
![OWASP Top 10: Broken Access Control](https://i.ytimg.com/vi/P38at6Tp8Ms/default.jpg)
![API Security 101 by Sadako](https://i.ytimg.com/vi/ijalD2NkRFg/default.jpg)
![Whiteboard Wednesday: An Intro to the OWASP Top 10](https://i.ytimg.com/vi/-7B9Ej4BFgw/default.jpg)
![5 Best Practices for Securing Your APIs](https://i.ytimg.com/vi/6wRuKgjbBVU/default.jpg)
![How to Effectively Use Postman for API Security Testing, Ronak Odhaviya | Postman Galaxy 2021](https://i.ytimg.com/vi/rAdCONqMJ1I/default.jpg)
![API Penetration Test + Burp + Postman](https://i.ytimg.com/vi/hUY8SeF54TE/default.jpg)
![Designing the Right Security Architecture for your APIs (Cloud Next '19)](https://i.ytimg.com/vi/PRGm2l-YhV0/default.jpg)
![Analyzing The OWASP API Security Top 10 For Pen Testers](https://i.ytimg.com/vi/5UTHUZ3NGfw/default.jpg)
![The OWASP API Security Top 10 | Dmitry Sotnikov](https://i.ytimg.com/vi/xAKcE15fxdA/default.jpg)
![Microservices vs API | Differences Between Microservice and API | Edureka](https://i.ytimg.com/vi/GwafAoXKV8A/default.jpg)
![OWASP Top Ten: Insufficient Logging and Monitoring](https://i.ytimg.com/vi/IFF3tkUOF5E/default.jpg)