How to secure an API with OIDC in Anypoint Platform

Security is one of the most critical requirements when we’re talking about developing modern APIs. But implementing this requirement can also be a straightforward task — today, we’re going to walk through a modern approach using the OpenID Connect mechanism to secure an API deployed in Anypoint Platform.

5 ways to ensure data and API security

In 2018, there were 6,500 data breaches reported, exposing billions of records for potential misuse. In today’s digitally connected world, security is almost always top-of-mind for businesses to keep their records are safe and secure. It’s critical for organizations to implement API security best practices to keep their integrations and the data that travels between systems under tight lock and key.   

Enable AI without compromising on cybersecurity

application network cybersecurity

Many businesses today are trying to augment and improve their customer, partner, and employee experiences by leveraging artificial intelligence and bots, yet grapple with the issue of cybersecurity. We’ve all heard of the numerous accounts of cybercriminals taking advantage of chat APIs, social network application vulnerabilities, and increasingly sophisticated phishing campaigns. However, the majority of cybersecurity hacks are still accomplished in a rather old-fashioned manner — through the use of stolen credentials.

Identity and Access Management with Anypoint Platform

open door to the world

This blog aims at capturing different technologies and protocols in the IAM space and mapping them to Anypoint Platform.

Zero trust: The key to securing the API economy

December 21 2018

0 comments
Securing API Economy

There’s no doubt that today’s businesses are under increasing pressure to innovate faster. Looking to deliver innovative offerings at an accelerated pace to meet ever-evolving customer expectations, many are turning to modern development models underpinned by the cloud, microservices architectures, and containerization technologies.

How NVIDIA integrated 12 different systems for GDPR compliance

gdpr-img

Here’s how NVIDIA leveraged an API-led approach to build system APIs for backend applications and stitch data together using a process API that leverages MuleSoft’s Message Processors.

What are perceived and actual security concerns for APIs?

security concern apis

APIs are rapidly becoming one of the most important infrastructural layers of the Internet while at the same time becoming a critical component of modern day attacks. They are difficult to secure and determined hackers are extremely tenacious in finding ways to exploit them. Despite what some people — even experts — would lead you to believe, there are no silver bullets. That said, when proactively managed and secured, the efficacy of APIs greatly outweighs the risks associated with deploying them.

It’s time for a new security model

blog security apis

Traditional security models—such as firewalls and DMZs—were designed to protect the perimeter. The thinking was that if the four walls of a company were protected, then threats would be neutralised before they come anywhere near core IT infrastructure. However, when bad actors inevitably made their way inside, they were often left undetected and free to move about as they extracted sensitive business data.

Building blockchain into your application network

application network blockchain

For those of us who work in financial services, blockchain is the most interesting technology trend to emerge in recent years. Evangelists of this technology expose the decentralized nature of blockchain, and use phrases like “world computer” to describe the promise of this technology. While it’s true that blockchain has revolutionary potential, it’s important at this stage of the adoption cycle to investigate valuable use cases that will drive broader adoption.

How cybercriminals take advantage of chat APIs and what to do about it

cyber crime

David Berlind is editor-in-chief of ProgrammableWeb

Cybersecurity solution provider Trend Micro has issued a report that highlights how chat platform APIs can and are being used by cybercriminals to achieve their nefarious objectives. 

Because of the degree to which Webhook APIs are involved (an API attack vector not previously discussed on ProgrammableWeb), the warnings and incidents should serve as a wake-up call to API providers and developers when it comes to the sorts of best practices and ongoing vigilance it takes to fully secure their customers and systems.Provided that the incentives are worth it,