Mashups using the same API (0)
Sorry, no related apis found.
With exciting new web techniques comes inevitable security issues. Luckily, there's usually a solution, though it can require a little more effort from developers. An article posted on IBM's developerWorks site covers some common mashup vulnerabilities. Among the techniques addressed are cross-site scripting and JSON data security. The author also provides some solutions or ideas for each vulnerability.
With both delivery and management of security increasingly moving to the cloud, organizations of all sizes are presented with new approaches to security that use APIs to reduce the complexity of securing applications.
BugDigger, a BugsIO bug reporting tool, offers the BugDigger API that can integrate with bug tracking and reporting systems. BugDigger removes the manual, human element from bug reporting and leverages its technology to automatically capture the needed data to accurately report bugs in a given environment. BugDigger aims to take the human error and labor out of bug reporting which enables software developers to rely on accurate reports and fixes instead of uncovering errors in bug reports.
||eSign Genie is an electronic signature service which allows documents to be signed securely. eSign Genie features document collaboration, template library, and 256-bit encryption. This service is...||Electronic Signature||04.21.2016|
||Passable API is a free, lightweight, RESTful web service that developers can easily implement to prevent password hacking and breaches. Developers can send the hash of the password and its...||Security||04.20.2016|
Threat Stack Webhook
||Threat Stack Webhook API is a cloud-based security solution that enhances the speed and synchrony of apps that resolve cross-platform events. Users can customize its configurations to automatically...||Cloud||04.20.2016|
||The Gophish API integrates simulated phishing campaign features into applications. Developers can set template and targets, launch a campaign, and measure results. JSON format and Key authentication...||Open Source||04.20.2016|
||Tozny is an authentication platform that uses cellphones as unique identifiers. This platform can be used as a strong cryptography layer for financial services or to eliminate the need of passwords...||Security||04.18.2016|