API Security Strategy - Discover and map APIs, block unwanted connection and prevent data leakage
This is the 2nd part of a 3 part series articles. For Part 1 - Governance and Automation - Distributd Apps for Hybrid Cloud Architecture, please refer to the link.
API Overview
API are fundamenta...
Updated Jan 04, 2023
Version 3.0Foo-Bang_Chan
Employee
Foo-Bang has 24+ years of experience in the IT industry ranging from application security, modern application architecture, devsecops, gitops and automation. He is passionate with emerging technologies such as cloud native architecture, AI, 5G SBA, service meshes, security and technologies that solve real world challenges and bring value to business.James_Hendergar
Employee
Dec 28, 2022Fantastic article, Foo Bang!
APIs are like snowflakes. Each one must be protected in the right way. I especially like the way the shadow API is called out in the example above.