Gear up for an enlightening journey into the realm of API safety within the on-demand replay of Episode 5 in our unique API Safety Masterclass!
Led by famend API safety skilled, Dr. Katie Paxton-Worry, these interactive classes usually are not your common webinars – they’re immersive experiences designed to empower everybody, from the curious developer to the seasoned hacker.
What to Anticipate:
Now that we’ve discovered some vulnerabilities in our API, how will we truly get them mounted? Extra importantly, how will we begin to construct a program that ensures all our API vulnerabilities are mounted? And stay mounted. This session will cowl:
- The fundamentals of vulnerability administration
- Tips on how to work with present developer workflows and foster a security-first mindset together with your growth crew
- Finest practices for integrating safety into your growth lifecycle
- Tips on how to implement sturdy safety measures, automate vulnerability, and combine safety into your growth lifecycle
- Tips on how to construct your API AppSec toolkit, from open supply instruments, to a number of the concerns earlier than you make investments
This session will begin with the fundamentals of how builders work and a few frequent growth methodologies they make use of, earlier than introducing vulnerability administration and the vulnerability lifecycle. We’ll focus on what makes API growth completely different, with a number of the frequent internet software frameworks, and a few recommendation on controlling API sprawl earlier than API endpoints are deployed. Then we’ll proceed free and open supply instruments you need to use and a number of the concerns on when it is best to take into account an improve to a full API safety platform like Traceable, protecting your API safe it doesn’t matter what your funds.
Meet Your Information: Dr. Katie Paxton-Worry
Dr. Katie Paxton-Worry, a trailblazer in API safety, will probably be your information all through this masterclass. Profit from her wealth of information as she navigates by APIs, vulnerabilities, and the methods to fortify your safety posture.