Concerned your API keys and other secrets are out in the open?
Free, no obligation API Leaks Assessment
Close
Privacy settings
We use cookies and similar technologies that are necessary to run the website. Additional cookies are only used with your consent. You can consent to our use of cookies by clicking on Agree. For more information on which data is collected and how it is shared with our partners please read our privacy and cookie policy: Cookie policy, Privacy policy
We use cookies to access, analyse and store information such as the characteristics of your device as well as certain personal data (IP addresses, navigation usage, geolocation data or unique identifiers). The processing of your data serves various purposes: Analytics cookies allow us to analyse our performance to offer you a better online experience and evaluate the efficiency of our campaigns. Personalisation cookies give you access to a customised experience of our website with usage-based offers and support. Finally, Advertising cookies are placed by third-party companies processing your data to create audiences lists to deliver targeted ads on social media and the internet. You may freely give, refuse or withdraw your consent at any time using the link provided at the bottom of each page.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
webinar

August 8, 2022 11:00 AM

Q2 API Vulnerability Report: Are APIs Really A Threat?

Thanks for the download. 
Thank you for signing up!
A confirmation email has been sent to the address you provided.
We look forward to seeing you! Please add the event in your calendar.
Thanks for filling out the form!
The webinar link will open in the new tab. If its not, please follow
this link

Earlier this year, Gartner wrote that “by 2022, API abuses will move from an infrequent to the most frequent attack vector, resulting in data breaches for enterprise web applications." [1] Midway through the year, is this being proved true by the facts on the ground? Is the threat real?

To address this, Wallarm continually collects and analyzes published API vulnerabilities and exploits. We dissect the data to look for trends and insights from a variety of perspectives, including software type, vendor, CVSS scores, CWEs and both OWASP Top-10 (2021) for web apps and OWASP API Security Top-10 (2019). We also look at publicly disclosed exploit POCs to determine where the risk lies.

In the 2nd of an ongoing series of webinars, Ivan Novikov, CEO & co-founder of Wallarm and noted security researcher, will reveal the latest API Exploits data and the implications to both organizational risk and your cyberdefenses.

In this webinar you will learn:

  • How big is the problem, and how does it impact your security efforts?
  • How can you assess risk, and prioritize your fixes?
  • How real is the threat, and where should you focus?

Our speakers:

Ivan Novikov

Ivan Novikov

CEO at Wallarm

  • Product security professional
  • inventor of memcached injection and SSRF types of attacks
  • Speaker at HITB, Black Hat, and other industry events