23 Aug Ethical Hacking Top Use Cases for Continuous API Security August 23, 2022 By Pivot Point Security 0 comments Communication among APIs now accounts for more than 80% of all internet traffic, according to Akamai. API hacks and misconfigurations a...Continue reading
22 Aug Ethical Hacking What is Continuous API Scanning and Why Should We (as App Developers) Care? September 15, 2022 By Pivot Point Security 0 comments The move from traditional web applications with 3-tier (client-server-database) architectures to today’s API-first apps has cancelled o...Continue reading
22 Aug Ethical Hacking What are the Financial Benefits of API-Level Security? August 22, 2022 By Pivot Point Security 0 comments As development trends have shifted from traditional web applications with 3-tier (client-server-database) architectures to today’s API-...Continue reading
19 Aug Ethical Hacking How Does an API-First Architecture Affect Your App Attack Surface? August 19, 2022 By Pivot Point Security 0 comments Back in the good old days (think back to, like, 2019) when web applications had a 3-tier client-server-database architecture, applicati...Continue reading
19 Aug Ethical Hacking Application Security and API Security are Becoming Synonymous—Are You Ready? August 19, 2022 By Pivot Point Security 0 comments Concern about application security is finally catching up to the urgent need for it. Yet just as orgs are wrapping their AppSec program...Continue reading