JavaScriptが無効です。ブラウザの設定でJavaScriptを有効にしてください
再生時間:
投稿日:
動画サイト:
画質:
As APIs have become the backbone of modern applications, threat actors are increasingly targeting them. Whether it be to exfiltrate data, ...
YouTube-Salt Security
Api Attack Landscape
Education
Api Governance
Api Security Is a Team Sport
In the third and penultimate video of this series, Mike Elissen, Sr. Developer Advocate at Akamai and expert in cybersecurity, dives deeper ...
YouTube-Akamai Developer
Introduction
Broken Level Function Authorization
Injection Attacks
Mass Assignment
Conclusion
API attacks aren't like traditional application attacks. Understanding those differences is crucial to protecting the valuable data and ...
API Attack Categories
A Strategy For API Security Success
How Salt Adaptive Intelligence enriches the API ecosystem
STEP (Salt Technical Ecosystem Partner) Program
In this episode of our AppSec 101 series, Shawn Simpson, Fortify Product Manager, discusses the what, why, and how behind API security ...
YouTube-Fortify Unplugged
What Are Api Security Attacks
Authentication
Static Analysis
Environmental Factors
Schema Validation
Api Discovery
Final Thoughts
A talk given by David Stewart from CriticalBlue at the 2019 Platform Summit in Stockholm. Gartner's statement that “By 2022, API abuses will ...
YouTube-Nordic APIs
What Is API Abuse?
The 2 Types Of API Abuse
Example Of API Abuse: Uber
Example Of API Abuse: Voi
API Abuse: Summary
How Should You Secure Remote Clients?
In this video from our API Security: Offence and Defence online course (now only available in a subscription plan) you can learn how does a ...
YouTube-Hakin9 Media
Course Modules
Types of DDOS attacks
Process of Hacker Targeting API
Finding the weakest endpoint
Prepare the Payload
Purpose of this tutorial
DDOS Mitigation
Limit Time of Request and Number of Requests
Use Caching when possible