The Open Banking API Security Imperative

The second Payment Services Directive (PSD2) in Europe, which requires banks to open their payment services to third parties via a series of APIs, has enabled a range of new FinTech products that make it easier for consumers and businesses to manage th… Continue reading The Open Banking API Security Imperative

Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks

As a mechanism to offload PCI risks, many retailers are now using third-party credit card processing for their online transactions. The retailer’s benefit is they are no longer handling the credit card data, thereby reducing the cardholder footprint (a… Continue reading Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks

How the HR System Enabled my Promotion to CEO

Just kidding. I am happy to remain an individual contributor. However, if the HR system API had been implemented without the appropriate levels of authorization control, commonly referred to as broken object-level authorization (BOLA), it could be expl… Continue reading How the HR System Enabled my Promotion to CEO

Three immediate steps to take to protect your APIs from security risks

In one form or another, APIs have been around for years, bringing the benefits of ease of use, efficiency and flexibility to the developer community. The advantage of using APIs for mobile and web apps is that developers can build and deploy functional… Continue reading Three immediate steps to take to protect your APIs from security risks

Credential stuffing is just the tip of the iceberg

Credential stuffing attacks are taking up a lot of the oxygen in cybersecurity rooms these days. A steady blitz of large-scale cybersecurity breaches in recent years have flooded the dark web with passwords and other credentials that are used in subseq… Continue reading Credential stuffing is just the tip of the iceberg

APIs: Securing the Stitching Connecting Applications

 Application programming interfaces (APIs) are an essential enabler of innovation in today’s digitally driven world. Applications (or application components) can leverage APIs to connect to other apps and communicate autonomously. APIs are found in us… Continue reading APIs: Securing the Stitching Connecting Applications

Cequence Security Named a 2021 TAG Cyber Distinguished Vendor

Research and advisory firm TAG Cyber has been publishing its seminal Security Annual report since 2016. Thousands of leaders and decision-makers across the cybersecurity ecosystem have come to rely on this report for expert guidance, analysis and educa… Continue reading Cequence Security Named a 2021 TAG Cyber Distinguished Vendor

Get Ready— It’s Almost Bots Attack Week!

All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your organization from threats such as API abuse, account takeovers, fake account creation and more. Every day C… Continue reading Get Ready— It’s Almost Bots Attack Week!