How to Help Businesses Get Better Visibility into their APIs

Share post:

The fact that application programming interfaces (APIs) are publicly available makes them potential security threats to organization’s data.

To address this problem, Cisco has introduced an open-source software tool called APIClarity, which attempts to address the security risks associated with API visibility issues. Vijoy Pandey explains how organizations can ensure that APIs from another source are secure, and Cisco VP for Cloud Systems and Distributed Systems has compiled a few tips to follow.

This includes keeping a regular look at security news from OWASP, treating software with the utmost importance, and ensuring that the software materials list traces each item to a trusted source, and finally the availability, hosting location, and overall reputation of an API in the industry.

In order to implement the recommended practices, Pandey asked users and organizations to look for software solutions that link or combine such practices. He also advised using fewer native services from cloud providers and resorting to managed services instead.

Those interested in native services should ask the right questions at the time of registration, namely future accessibility.

For more information, read the original story in Reuters.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways