23 Aug Ethical Hacking Top Use Cases for Continuous API Security January 15, 2024 By Pivot Point Security Communication among APIs now accounts for more than 80% of all internet traffic, according to Akamai. API hacks and misconfigurations a... Continue reading
22 Aug Ethical Hacking What is Continuous API Scanning and Why Should We (as App Developers) Care? January 19, 2024 By Pivot Point Security The move from traditional web applications with 3-tier (client-server-database) architectures to today’s API-first apps has cancelled o... Continue reading
22 Aug Ethical Hacking What are the Financial Benefits of API-Level Security? January 19, 2024 By Pivot Point Security As development trends have shifted from traditional web applications with 3-tier (client-server-database) architectures to today’s API-... Continue reading
19 Aug Ethical Hacking How Does an API-First Architecture Affect Your App Attack Surface? January 18, 2024 By Pivot Point Security Back in the good old days (think back to, like, 2019) when web applications had a 3-tier client-server-database architecture, applicati... Continue reading
19 Aug Ethical Hacking Application Security and API Security are Becoming Synonymous—Are You Ready? January 18, 2024 By Pivot Point Security Concern about application security is finally catching up to the urgent need for it. Yet just as orgs are wrapping their AppSec program... Continue reading