{"id":4968,"date":"2021-05-10T15:47:36","date_gmt":"2021-05-10T15:47:36","guid":{"rendered":"https:\/\/www.securecoding.com\/?post_type=webinars&#038;p=4968"},"modified":"2024-04-10T09:41:32","modified_gmt":"2024-04-10T09:41:32","slug":"api-security","status":"publish","type":"webinars","link":"https:\/\/www.securecoding.com\/webinars\/api-security\/","title":{"rendered":"Getting API Security Right"},"content":{"rendered":"<section class=\"c-block c-margin c-margin--bottom-default c-block b-text b-text--page-api-security  align\" id=\"b-text-1\">\n\t<div class=\"container\">\n\t\t<div class=\"c-text\">\n\t\t<p><strong>Speaker:<\/strong>\u00a0Dr. Phillipe de Ryck<\/p>\n<p>Does the rise of APIs result in the downfall of security? Why are there so many vulnerabilities and incidents involving APIs? How can you ensure that your APIs are secure? In this session, we use real-world cases to dive into best practices for securing your APIs. We discuss the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems. At the end of this session, you will have an actionable set of guidelines to assess and improve the security of your own APIs.<\/p>\n\n\t<\/div>\n\t<\/div>\n<\/section>\n","protected":false},"featured_media":6500,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4968","webinars","type-webinars","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Getting API Security Right - SecureCoding<\/title>\n<meta name=\"description\" content=\"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securecoding.com\/webinars\/api-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting API Security Right - SecureCoding\" \/>\n<meta property=\"og:description\" content=\"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securecoding.com\/webinars\/api-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SecureCoding\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T09:41:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"84\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/\",\"url\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/\",\"name\":\"Getting API Security Right - SecureCoding\",\"isPartOf\":{\"@id\":\"https:\/\/www.securecoding.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp\",\"datePublished\":\"2021-05-10T15:47:36+00:00\",\"dateModified\":\"2024-04-10T09:41:32+00:00\",\"description\":\"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.securecoding.com\/webinars\/api-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage\",\"url\":\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp\",\"contentUrl\":\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp\",\"width\":150,\"height\":84},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securecoding.com\/webinars\/api-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securecoding.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/www.securecoding.com\/webinars\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting API Security Right\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securecoding.com\/#website\",\"url\":\"https:\/\/www.securecoding.com\/\",\"name\":\"SecureCoding\",\"description\":\"Everything you need to know about code security\",\"publisher\":{\"@id\":\"https:\/\/www.securecoding.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securecoding.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securecoding.com\/#organization\",\"name\":\"SecureCoding\",\"url\":\"https:\/\/www.securecoding.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securecoding.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2020\/07\/Secure-Coding_new-logo_SecureCoding_logo_Horizontal.svg\",\"contentUrl\":\"https:\/\/www.securecoding.com\/wp-content\/uploads\/2020\/07\/Secure-Coding_new-logo_SecureCoding_logo_Horizontal.svg\",\"width\":320,\"height\":65,\"caption\":\"SecureCoding\"},\"image\":{\"@id\":\"https:\/\/www.securecoding.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting API Security Right - SecureCoding","description":"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securecoding.com\/webinars\/api-security\/","og_locale":"en_US","og_type":"article","og_title":"Getting API Security Right - SecureCoding","og_description":"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.","og_url":"https:\/\/www.securecoding.com\/webinars\/api-security\/","og_site_name":"SecureCoding","article_modified_time":"2024-04-10T09:41:32+00:00","og_image":[{"width":150,"height":84,"url":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/","url":"https:\/\/www.securecoding.com\/webinars\/api-security\/","name":"Getting API Security Right - SecureCoding","isPartOf":{"@id":"https:\/\/www.securecoding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage"},"image":{"@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp","datePublished":"2021-05-10T15:47:36+00:00","dateModified":"2024-04-10T09:41:32+00:00","description":"We dive into best practices for securing your APIs, the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems.","breadcrumb":{"@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securecoding.com\/webinars\/api-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/#primaryimage","url":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp","contentUrl":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2021\/05\/getting-API-security-right-e1708072663318.webp","width":150,"height":84},{"@type":"BreadcrumbList","@id":"https:\/\/www.securecoding.com\/webinars\/api-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securecoding.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/www.securecoding.com\/webinars\/"},{"@type":"ListItem","position":3,"name":"Getting API Security Right"}]},{"@type":"WebSite","@id":"https:\/\/www.securecoding.com\/#website","url":"https:\/\/www.securecoding.com\/","name":"SecureCoding","description":"Everything you need to know about code security","publisher":{"@id":"https:\/\/www.securecoding.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securecoding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securecoding.com\/#organization","name":"SecureCoding","url":"https:\/\/www.securecoding.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securecoding.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2020\/07\/Secure-Coding_new-logo_SecureCoding_logo_Horizontal.svg","contentUrl":"https:\/\/www.securecoding.com\/wp-content\/uploads\/2020\/07\/Secure-Coding_new-logo_SecureCoding_logo_Horizontal.svg","width":320,"height":65,"caption":"SecureCoding"},"image":{"@id":"https:\/\/www.securecoding.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/webinars\/4968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/webinars"}],"about":[{"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/types\/webinars"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/comments?post=4968"}],"version-history":[{"count":0,"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/webinars\/4968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/media\/6500"}],"wp:attachment":[{"href":"https:\/\/www.securecoding.com\/wp-json\/wp\/v2\/media?parent=4968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}