The amount of data captured for analysis is increasing all the time. Often this data is fed into multiple systems that need to analyze, process, persist or perform other operations with it. It is important that these systems make sure that sensitive data is identified and redacted.
Recent Security ArticlesView all
There are three standard ways to manage API authentication these days: API keys, OAuth tokens and JSON Web tokens (JWT). Adam Duvander over at the Zapier engineering blog explains how and when to use them. The humble API key is the common and earliest form of API authentication.
A researcher has found a vulnerability in the latest version of reCAPTCHA that could let spambots bypass reCAPTCHA fields across millions of sites. The developer has a script that uses Google’s speech recognition API to solve audio challenges associated with the latest version of reCAPTCHA.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||The Infobip APIs allow for integration tools that aim to utilize Infobip products and services in a single place. Infobib has five different APIs; HTTP SMS API, Voice API, OMNI Channel API, Factor...||Messaging||11.09.2011|
All Security APIs (547)View all
||The wolfSSL_CTX API adds several SSL capabilities to embedded devices, IoT devices, smart grids, connected homes, automobiles, routers, applications and games. The API generates SSL objects that can...||Security||04.21.2017|
NameScan PEP & Sanction
||This REST API enables searching through a comprehensive list of Politically Exposed Persons, sanctioned individuals, and entities for the purpose of reporting for Anti-Money Laundering compliance.||Compliance||04.06.2017|
||The Secured Signing Partner API integrates electronic signature into applications. It is available with OAuth2 authentication and API Key to send requests in HTTP and receive responses in JSON....||Electronic Signature||03.29.2017|
Google Cloud Data Loss Prevention
||The Google Cloud Data Loss Prevention API offers scalable classification and redaction services for sensitive information such as credit card numbers, social security numbers, and passport numbers....||Data||03.28.2017|
||The wolfSSL_Init API initializes the wolfSSL library in preparation for establishing a secure TLS connection. It is a small, fast, and portable implementation of TLS/SSL for embedded devices to the...||Security||03.24.2017|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|