Skip to main content
ProgrammableWeb Mashup & API Directory
  • ProgrammableWeb
  • Api Directory
  • COVID-19
  • s
  • RSS
  • Share
  • User
  • Api News
  • Api Directory
  • Coronavirus
  • Learn about APIs
  • What is an API ?
  • Add Your Api
  • Glossary
  • ADD APIs & MORE
    • API
    • SDK
    • Sample Source Code
    • Library
    • Framework
    • App or Mashup
  • Rss
  • Facebook
  • Twitter
  • LinkedIn
  • ProgrammableWeb
  • Learn about APIs
  • What is an API ?
  • Api News
  • Api Directory
  • API Charts & Research
  • Glossary
  • Add Api
    • API
    • SDK
    • Sample Source Code
    • Library
    • Framework
    • App or Mashup
  • Coronavirus
  • ADD APIs & MORE
    • API
    • SDK
    • Sample Source Code
    • Library
    • Framework
    • App or Mashup
  • Rss
  • Facebook
  • Twitter
  • LinkedIn
  • Rss
  • Icons
    • Facebook
    • Twitter
    • LinkedIn
  • User
 
API University

Best Practices, Tips & Tutorials for API Providers and Developers

  • Home
  • Core curriculum
  • API Providers
  • Developers
  • Executive Briefing Center
    • Home
    • Core curriculum
    • API Providers
    • Developers
    • Executive Briefing Center

For API Providers

Why You Should Re-evaluate the Strength of Your API Security
API University

APIs are core to digital business—assembling data, events, and services from within the organization and across devices. With organizations moving more of business online, those APIs are being exposed to externalities, whether to other departments, customers, or enterprises in their partner network.
Analysis
Pubudu Gunatilaka
Security, Authentication, OAuth
04-29-2020

Plugging Future API Security Leaks: Are You Prepared?
API University

APIs sit at the center of organizations’ digital transformation initiatives, making them attractive to hackers. In response, API management solutions are employed, but organizations also need to address the growth of more sophisticated attacks on APIs by implementing dynamic, AI driven security.
Analysis
sanjeewa malalgoda
Security, API Management, Artificial Intelligence
08-01-2019

Is the API in Your App a Trojan Horse?
API University

Attackers know that API calls originating from inside an app are a blueprint for the infrastructure inside your data center. Further, they can use those same API calls to hide their malicious purposes, like a Trojan horse ready to slip through the front door. Apps are the new emerging threat vector.
Analysis
Aaron Lint
Security, API Design
11-29-2018

How to Build a Secure API Strategy for the API Economy
API University

APIs, via B2B partnerships and B2C applications, can increase a company’s reach and make digital assets and services available to broader audiences. There are dangers posed by the adoption of insecure APIs in the enterprise. Hence, businesses need a strategy for building and operating secure APIs.
Analysis
Setu Kulkarni
Security, API Strategy
10-25-2018

Panera Bread Shows How Not to Respond to Data Vulnerability
API University

All companies have an obligation to protect user data as best as they can in accordance with their respective terms of services. When data is compromised, those companies should react quickly to fix it. Panera Bread offers a case study in the wrong way to respond to a vulnerability.
Case Study
Wendell Santos
Security, Developer Relations
04-16-2018

Understanding API Connectivity to Resolve App DDoS Attacks
API University

Cloud-based apps rely on an increasingly diverse set of underlying services, tied together through APIs - and hackers have taken notice. To resolve attacks and outages affecting APIs it is critical to understand and test the performance of the service delivery of application components.
Analysis
Nick Kephart
Security, DevOps, Monitoring
10-13-2017

Understanding What it Takes to Secure Your API
API University

At this point in your API journey, you have made a number of business decisions and a couple of technical ones. Now, several crucial decisions need to be made around security. Securing an API is an often neglected task, yet doing so is at the heart of an effective API strategy.
Analysis
Mark Boyd
Security, API Design, API Education
09-27-2017

Equifax Secret PIN Controversy Exemplifies The Need For Rate Limits
API University

After it was revealed that over 143 million Americans may have been impacted when their personally identifiable information may have been breached through the credit reporting agency Equifax, there were further revelations that the so-called secret PINs issued by Equifax were actually timestamps.
Analysis
David Berlind
Security, Financial, Privacy
09-13-2017

How To Keep Your Company Out of the Data Breach Headlines
API University

Although most of the technical details regarding the breach of Equifax are not known, the scope of the damage and the questions it raises should be enough to stimulate some organizational introspection regarding all that you have done to safeguard your Web services, sites, and APIs.
Analysis
David Berlind
Security, Financial
09-08-2017

How Cybercriminals Take Advantage of Chat APIs and What To Do About It
API University

Cybersecurity solution provider Trend Micro has issued a pair of reports that highlight how chat platform APIs can and are being used by cybercriminals to achieve their nefarious objectives. Because of the degree to which Webhook APIs are involved (an API attack vector not previously discussed
Analysis
David Berlind
Security, Chat, Text
08-11-2017
  • 1
  • 2
  • 3
  • 4
  • next ›

Coronavirus Developer Resource Center

COVID-19 APIs, SDKs, coverage, open source code and other related dev resources »

Executive
Api Briefing Center
More Business. Less Tech.
How NZ Post Relies On APIs To Fend Off The Threat From Uber, Others
How To Find a Rockstar API Product Manager For Your Public APIs
Methods of Pricing an "API as Product"
How To Show Senior Leadership the Importance of APIs
KPIs for APIs: Developer Experience Can Make or Break Your API
How 200-Year-Old Citibank Totally Nailed Its Hackathon
More for Executives  ›
Whitepapers and Reports
Sponsored by MuleSoft

The Rise of The Composable Enterprise

Download Now

Architecting the Composable Enterprise

Download Now

API-Led Connectivity: The Next Step in the Evolution of SOA

Download Now
More Whitepapers from MuleSoft
Additional Resources
API Growth Charts, Industry Research & More
API Growth Charts, Industry Research & More
Developer How-to's & Live Presentations
Developer How-to's & Live Presentations
Meet The Editors
david_berlind's picture
David Berlind
Editor in Chief
@dberlind
Articles
wsantos's picture
Wendell Santos
Editor
@wendell78
Articles
KevinSundstrom's picture
Kevin Sundstrom
News Editor
@sundstrom_kevin
Articles
  • Directories & Listings
  • API Directory
  • SDK Directory
  • Sample Source Code
  • Mashups and Apps
  • Libraries
  • Frameworks
  • Resources
  • About ProgrammableWeb
  • FAQ
  • How To Get Your News Covered On ProgrammableWeb
  • Contributed Content Guidelines
  • Get Paid to Write for ProgrammableWeb
  • Contact Us
  • Business & Legal
  • Site Terms of Service
  • Privacy Policy
  • Cookie Preferences
  • Subscribe
  • Rss
  • Twitter
  • Facebook
  • LinkedIn