search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Networking


it becomes a priority to reassess and enhance the security controls surrounding them. Internal-use APIs oſten lack the same level of security robustness applied to external APIs. Terefore, businesses should implement new security controls which are appropriate when operating in a less trusted environment; controls such as web application firewalls, more robust TLS encryption, client certificates, and limiting connections from untrusted IP addresses. Another tactic businesses should be adhering to, is the principle


of ‘layering’ - a renowned mantra in the cybersecurity sphere, but an important concept nonetheless that avoids reliance on a single security measure to counteract risk derived from APIs. For example, picture the DevOps pipeline. When writing code, the DevOps team uses linting (examination of source code to identify possible errors, bugs and stylistic inconsistencies) before the code is committed. During code commits, static analysis, dependency checks and active scanning are then used to identify errors, vulnerabilities and anomalies. By adopting this layered approach, businesses establish a comprehensive security framework with multiple levels of protection which enables them to catch threats that may have weaved their way through the cracks. In fact, active scanning is an important component of an API


security stack and should be considered a foundational protection pillar. With new vulnerabilities being detected daily, continuous scanning is a must - acting as an unyielding shield against threats. As well as identifying vulnerabilities, it also provides a comprehensive understanding of the entire system, including the API structure and the security of the underlying operating system, server soſtware, and network security.


Saving money through API scanning tools One of the biggest challenges companies face when it comes to securing their networks is gaining full visibility of networks across all their various DevOps teams. Without that visibility, it can be tough to identify dormant systems and resources that can end up accruing vulnerabilities and costing a lot of money the longer they’re leſt online. Tools for API Scanning and vulnerability


management offer much more than just their primary functions. Trough syncing with cloud accounts, these tools provide visibility of various security threats, and help you to identify unnecessary active systems. Tis effectively allows you to offset some of the cost of API scanning and vulnerability management tooling as you reduce the longer-term costs associated with those services, while simultaneously increasing your organisation’s resilience. Tis means that using these tools helps you achieve success in both security and financial sustainability. By embracing API scanning, businesses unlock


a path to substantial savings that can fuel further improvements to their cybersecurity efforts. With the growing sophistication of cyber threats and attacks that companies are facing today, it’s a simple yet effective strategy – invest in API scanning tools wisely, stay ahead, and continue to maintain your reputation in a fiercely competitive market.


www.pcr-online.biz July/August 2023 | 25


A ‘democratic’ approach to security In smaller tech companies, there is oſten no dedicated security team or role. Instead, the responsibility for network security falls on whoever is available at the time. Tis can be spun into a benefit – where a democratic approach to security is founded in which everyone in the organisation ends up being aware of how security issues in their own systems can impact the business, and what they need to do to prevent an incident. When it comes to API security in smaller companies, CTOs


usually take the lead. However, DevOps teams and engineers should also play a significant role in managing company infrastructure and transitioning to a DevSecOps approach. Tis involves integrating security throughout the soſtware development life cycle, from planning to deployment and beyond. Effective communication is essential in this approach to security.


Using communication tools like Slack and Teams can be a key factor in elevating awareness throughout the organisation. By sending alerts to entire teams or groups within the company, everyone is kept in the loop on potential security issues, updates and threats. Tis helps ensure that the entire organisation is on the same page regarding security and can work together to address any issues that arise.


So, what’s next? Organisations must prioritise keeping their APIs safe and secure from cybercriminals who may try to access them. Cyber attacks spare no one and can happen to anyone - they are not just limited to large corporations. It’s easy for a business to fall into the trap of thinking that they are too small to be targeted, however even a small security breach can have devastating consequences. Tis is why it’s essential for businesses to take proactive steps to


protect their organisation to secure APIs. Although there are many steps that businesses can take to improve their API security, these are some top-tier measures that can help establish a foundation that paves the way for powerful security defences, and peace of mind.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52