API Security Strategy - Discover and map APIs, block unwanted connection and prevent data leakage
This is the 2nd part of a 3 part series articles. For Part 1 - Governance and Automation - Distributd Apps for Hybrid Cloud Architecture, please refer to the link.
API Overview
API are fundamenta...
Updated Jan 04, 2023
Version 3.0Foo-Bang_Chan
Employee
Foo-Bang has 24+ years of experience in the IT industry ranging from application security, modern application architecture, devsecops, gitops and automation. He is passionate with emerging technologies such as cloud native architecture, AI, 5G SBA, service meshes, security and technologies that solve real world challenges and bring value to business.Foo-Bang_Chan
Employee
Dec 28, 2022Thanks. Yes. The fundamental principle is "you can't protect what you can't see". F5 XC API discovery help to uncover what you can't see (shadow API).