Three API Security Practices for CISOs
FOLLOW US ON:
Application programming interfaces (APIs) have been around for decades, but their use
has exploded in recent years as enterprises ramp up their digitization efforts.
As API usage continues to grow, API attacks are becoming increasingly common. Many CISOs
have realized that their API security needs to be reviewed. API attacks often result in data
breaches, exposing sensitive medical, financial and personal data as companies use APIs to create
more communications and transmit data.
While the effort may appear onerous at times, CISOs may take some basic actions to
ensure API security.
Leaning on user-controlled input isn’t a good idea
CISOs should not rely on user-controlled inputs to give any response or data for improved API
security. Any user’s sensitive data can be obtained by fiddling with a request or response. CISOs
should get the majority of the needed inputs through secured signatures rather than relying on a
user’s request input.
Full Article: Top Three API Security Practices for CISOs
IT security News

Three API Security Practices for CISOs.docx

  • 1.
    Three API SecurityPractices for CISOs FOLLOW US ON: Application programming interfaces (APIs) have been around for decades, but their use has exploded in recent years as enterprises ramp up their digitization efforts. As API usage continues to grow, API attacks are becoming increasingly common. Many CISOs have realized that their API security needs to be reviewed. API attacks often result in data breaches, exposing sensitive medical, financial and personal data as companies use APIs to create more communications and transmit data. While the effort may appear onerous at times, CISOs may take some basic actions to ensure API security. Leaning on user-controlled input isn’t a good idea CISOs should not rely on user-controlled inputs to give any response or data for improved API security. Any user’s sensitive data can be obtained by fiddling with a request or response. CISOs should get the majority of the needed inputs through secured signatures rather than relying on a user’s request input. Full Article: Top Three API Security Practices for CISOs IT security News