انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Season 2: Episode 4 - API Attacks and New Architectures
سلسلة مؤرشفة ("تلقيمة معطلة" status)
When? This feed was archived on October 04, 2024 12:11 (). Last successful fetch was on October 29, 2019 17:07 ()
Why? تلقيمة معطلة status. لم تتمكن خوادمنا من جلب تلقيمة بودكاست صحيحة لفترة طويلة.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 245039512 series 2410262
In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks
8 حلقات
سلسلة مؤرشفة ("تلقيمة معطلة" status)
When? This feed was archived on October 04, 2024 12:11 (). Last successful fetch was on October 29, 2019 17:07 ()
Why? تلقيمة معطلة status. لم تتمكن خوادمنا من جلب تلقيمة بودكاست صحيحة لفترة طويلة.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 245039512 series 2410262
In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The team explains the different kinds of API breaches they’ve seen, what organizations can do to protect their APIs, and make a few predictions about how the security world will adapt to these new risks
8 حلقات
Alle episoder
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.