Reusable KPIs for Reusable APIs: The Metrics – Part 2

reusable apis mulesoft

In part 1 of this post, we have established the overall value proposition of defining reusable KPIs in an attempt to assess and drive the concept of reuse within your API platform. Once the capability to establish and monitor both abstract baselines and progress against them have been established within an enterprise, the next step is to determine what metrics are worth tracking, where they break down, and how they relate to each other.

Reusable KPIs for Reusable APIs: The Value Prop – Part 1

api reusable

A lot of enterprise IT concepts and tools have experienced dramatic change in the last decade. Several long-lived rules of thumb have faded into irrelevance. However, one conceptual holy grail has survived the volatility of the IT transformation toward all things cloud, DevOps, and APIs: reuse. Like historical explorers seeking the Northwest Passage, enterprise IT executives have long sought out ways (e.g. SOA) to drive down the cost of solution development through code reuse.

How Cybercriminals Take Advantage of Chat APIs and What To Do About It

cyber crime

David Berlind is editor-in-chief of ProgrammableWeb

Cybersecurity solution provider Trend Micro has issued a report that highlights how chat platform APIs can and are being used by cybercriminals to achieve their nefarious objectives. 

Because of the degree to which Webhook APIs are involved (an API attack vector not previously discussed on ProgrammableWeb), the warnings and incidents should serve as a wake-up call to API providers and developers when it comes to the sorts of best practices and ongoing vigilance it takes to fully secure their customers and systems.Provided that the incentives are worth it,

How APIs are the Backbone of New IoT Standards

iot mulesoft

The Internet of Things (IoT) is supposed to have 10 times the impact of the Web itself, which means it has potentially 10 times the risk for complication, and, with its ubiquity, 10 times the risk to security. Each “Thing” we encounter in our daily and professional lives could potentially be connected within the next couple years. And with so many, many more players, manufacturers, protocols, and programming languages, it all gets exponentially more complicated.

API security: Platform capabilities and API-led Connectivity example

November 10 2016

0 comments
api-security-mulesoft-api-led-connectivity

This is part 3 of my API security blog series. I will be showing an example scenario of how Anypoint platform can be a vital component of a secure API-led architecture and the capabilities to securing the API.

If you missed part 1 and part 2 here they are:

  1. API security: Ways to authenticate and authorize
  2. API security: Keeping data private but accessible

3.

API security: Ways to authenticate and authorize

API Security- Authentication and Authorization

This post will be part 1 of 3 for my ultimate guide to API security best practices series. In this post, I will be discussing the current concerns IT decision makers have in regards to their current digital assets.

IoT security is bad. What can developers do about it?

Ars Technica had a scary article this week about an IoT search engine that allows users to search for webcams displaying anything, including marijuana plantations, bank back rooms, kitchens, bathrooms, and yes, sleeping babies. Webcams have easily exploitable security vulnerabilities, and those webcams are broadcasting video via API.

Part of the security problem is consumers. Because webcam manufacturers are working with very tight margins, and customers haven’t seen value in privacy and security,

Ensure API security with Anypoint Platform

types of apis

API security breaches are expensive. How expensive? They can cost $400m or more. APIs are a strategic necessity for any business but it’s equally important to keep them safe.

Fortunately, there are lots of resources available to make sure that API security is baked into your APIs as you design and deploy them.

We have released a new whitepaper,

API Security Best Practices – upcoming webinar

APIs have become a strategic necessity for your business. They facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400M or more, senior IT decision makers are right to be concerned about API security.

In an upcoming webinar, API Security Best Practices,

Upcoming webinar: Top secrets of API security

The importance of security

In April 2013, hackers hijacked the Associated Press’ Twitter account to post one fake tweet about two bombs exploding at the White House and the President being injured. As a result, the stock market went into a 143-point free-fall before the hoax was exposed and Dow Jones Industrial Index recovered. The entire episode may have only lasted 3 minutes, but thanks to programmed trading, billions of dollars can be made or lost in milliseconds.