What is API Rate Limiting?
API rate limiting maintains software availability. In this video, Jacob Garrison explains how different types of rate limiting affect software performance.
API rate limiting maintains software availability. In this video, Jacob Garrison explains how different types of rate limiting affect software performance.
Security teams are purpose-built to protect sensitive data. In this video, Jacob explains the three main approaches for discovering sensitive data in software.
Authentication in software means you digitally identify yourself. In this video, Jacob Garrison explains how to combine the three primary authentication factors to ensure robust multi-factor authentication.
Preventing SQL injection is a fundamental part of coding securely. Jacob Garrison explains why SQL injection occurs and the steps you must take to prevent it.
According to OWASP, Injection is an attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter.
In this video, Jacob Garrison introduces injection attacks, as well as the different injection attacks you should defend against.
LocalStorage allows developers to include information within the browser that’s needed at later points in time. This data is typically stored in plaintext format – and it introduces some issues.
Below is an example of our very own Jacob Garrison walking through localStorage manipulation.
To learn more, check out our blog about mitigating the dangers of single-page applications (SPAs).
In this series of videos, Jacob Garrison walks through measuring risk in production: why do it, stakeholders, and how to do it with Bionic.
To learn more about Bionic, book a demo with an expert today.
In security, you should know about three data states: at rest, in transit, and in use. Check out the video to learn more.
To learn more about Bionic, book a demo with an expert today.
What happens when you store data in the wrong environment? Nothing good.
Check out this video to learn:
Be sure to check out how ASPM can help solve cross-environment contamination below.
To learn more about Bionic, book a demo with an expert today.
Because ASPM understands the full architecture of applications, it is very useful for data privacy and data security.
To learn more about Bionic, book a demo with an expert today.
When looking at risk scoring, the first thing you need to consider is threats. These are the things that people use to break into the system. These are the common attack vectors that we’re familiar with.
Next, you factor in the exploitability or the accessibility of that service, so if this is a service that has a public-facing IP address, it is a lot more accessible than a service that only has internal connections.
Finally, you need to factor in the criticality of what that service is accessing.
Check out the rest of this video to learn more.
In the next video, Jacob walks through how Bionic ASPM scores risk.
To learn more about Bionic, book a demo with an expert today.
In this video, Jacob Garrison walks through how to calculate a return on investment in your security program.
To learn more about Bionic, book a demo with an expert today.
Tokenization, encryption, and hashing. Three encryption methods that you should learn about. Check out the video below to learn more.
To learn more about Bionic, book a demo with an expert today.
Gartner recently released its first-ever Innovation Insight for Application Security Posture Management (ASPM). Check out our very own Jacob Garrison’s insights on the ASPM market.
To learn more about Bionic, book a demo with an expert today.