API-First Strategies Require API-First Security

Editor’s note: This post was originally published in July 2021 in ToolBox.
Back in 2017, Gartner predicted that API abuse would be the most frequent attack vector for data breaches by 2022. Two years later, when exposed APIs already made up 40% o… Continue reading API-First Strategies Require API-First Security

Guest Blog: Alissa Knight on ‘Playing with FHIR’

We are delighted to be hosting some unique content from our friend and recovering hacker Alissa Knight. This is the third blog in a series about the security risks exposed by the push to adopt FHIR APIs in US healthcare.
The post Guest Blog: Aliss… Continue reading Guest Blog: Alissa Knight on ‘Playing with FHIR’

Guest Blog: Alissa Knight on ‘FHIR Walker: Authentication and Authorization in FHIR APIs’

We are delighted to be hosting some unique content from our friend and recovering hacker Alissa Knight who will be writing on the topic of healthcare API security. In the first article, Alissa provided a plain English explanation of FHIR from the … Continue reading Guest Blog: Alissa Knight on ‘FHIR Walker: Authentication and Authorization in FHIR APIs’

Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate

To conduct effective automated quality and application security testing, app developers must test each feature repeatedly at various stages of development.

The post Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate

Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate

To conduct effective automated quality and application security testing, app developers must test each feature repeatedly at various stages of development.

The post Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 2: Straight Out of the Gate

Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.

The post Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption

Agile adoption enables security professionals to deliver high-quality, secure software and eliminate the pitfalls common to traditional strategies.

The post Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption appeared first on Security Intelligence.

Continue reading Automated Quality and Application Security Testing, Part 1: How to Be Agile With Your Agile Adoption