News

Salt Security announced new research urging organizations to prioritize API security to unlock the true potential of agentic ...
API security challenges: The weaknesses of tokens When looking to exploit an API, threat actors will often try to harvest client credentials and API keys to obtain access to the underlying data.
For effective API security, build a collaborative defense across development, operations, and business teams and take advantage of these proven strategies for strengthening defenses.
Sumo Logic, a U.S.-based cloud data analytics and log analysis company, is urging users to reset API keys after discovering a security breach. In a security notice published this week, Sumo Logic ...
Some of the things we expected, such as secure access service edge (SASE), cloud security, shift left security, and API security, lived up to expectations.
It’s no coincidence that they were also more likely than any other to cite API security as a top priority (21%). “API security has yet to become a key element in a comprehensive security strategy,” ...
Analysis of 600 apps on the Google Play store by CloudSEK’s BeVigil security search engine found that 50% were leaking application programming interface (API) keys of three popular transactional and ...
Shay Levi is the co-founder and CTO at Noname Security, a leading provider of complete and proactive API security. If data breaches can be devastating for companies, regardless of their size ...
Akamai Technologies has completed the acquisition of Noname Security for about $450 million to expand its API security offerings.
GitHub is now automatically blocking the leak of sensitive information like API keys and access tokens for all public code repositories.
JumpCloud invalidates API keys This morning, BleepingComputer received a tip off from an anonymous reader alerting us to a potential security incident at JumpCloud.