Jamie BecklandinTraceable and TrueAsk the Experts: Understanding the API Context Maturity Model — Level 0 — Open, Public API CallsOur new series explores the state of APIs from the perspective of industry leaders in reference to our new API Context Maturity Model.Jul 26, 2023Jul 26, 2023
Jamie BecklandinTraceable and TrueContxt Partners With APImetrics to Extend API SecurityLearn about our newest partnership, APImetrics.Jul 26, 2023Jul 26, 2023
Jamie BecklandinTraceable and TrueIntroducing the API Context Maturity ModelPreviously, we have discussed the advantages and disadvantages of other API Maturity Models. In this post, we will discuss our own version.Jul 26, 2023Jul 26, 2023
Jamie BecklandinTraceable and TrueExisting API Maturity Models — Overview and LimitationsThe industry is going through an API transformation, meaning there are a lot of insecure and unmonitored APIs lurking in companies.Jul 26, 2023Jul 26, 2023
Jamie BecklandinTraceable and TrueOWASP API2:2019 — What Is Broken Authentication and Why It’s ImportantOne of the biggest API security risks is broken authentication, according to OWASP. So, what is broken authentication?Jul 25, 2023Jul 25, 2023
Jamie BecklandinTraceable and TrueOWASP API1:2019 — What Is Broken Object Level Authorization and Why It’s ImportantThe number one biggest API security risk is broken object level authorization, according to OWASP. What is it?Jul 25, 2023Jul 25, 2023
Jamie BecklandinTraceable and TrueTwitter’s security issues are way worse than anyone thoughtTwitter’s former head of security, Peiter “Mudge” Zatko, has filed a whistleblower complaint against Twitter for, among other things, poor…Aug 24, 2022Aug 24, 2022
Jamie BecklandinTraceable and TrueAPI security is now more important than web application securityWe have been reviewing the OWASP Top Ten in some detail, which is the premier index of the most critical vulnerabilities in web…Jul 14, 2022Jul 14, 2022
Jamie BecklandinTraceable and TrueOWASP A02 — Cryptographic Failures: What they are and why they are importantThe second most common issue in web application security is cryptographic failures. Cryptography has always been important, but we have…Jul 8, 20221Jul 8, 20221
Jamie BecklandinTraceable and TrueOWASP A01 — Broken Access Control: What it is and why it’s importantThe number one biggest web application security risk is broken access control, according to OWASP. So, what is broken access control and…Jul 5, 2022Jul 5, 2022