How to Build an Effective API Security Strategy

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 9

  • @domaincontroller
    @domaincontroller 3 года назад +13

    09:43 Only expose the interfaces that we need 10:02 Only collect and share the data that we need 11:58 legal
    14:12 bad guy wants to have 14:38 no authentication or authorization 15:09 customized developed authentication and authorization system 15:58 API Gateway 16:50 some sort access management, OAuth 17:19 Consumption 17:23 smarter about our data 18:53 OAuth, OpenID standards 21:20 When the bad news comes, they don't go to the developers and blame them, they go to the security team, what API ?

  • @rlagathu
    @rlagathu 4 года назад +4

    Very enlightening, thanks !

  • @mback12000
    @mback12000 4 года назад +30

    Long needlessly rambling story for an intro.. Skip to 9:42 if you want to actually get to the topic in the title

    • @tenminutetokyo2643
      @tenminutetokyo2643 4 года назад +3

      Michael B Another arrogant tech type who thinks everyone cares who he is or what he does.

    • @TheSilverGate
      @TheSilverGate 4 года назад +1

      Exactly, I think that he confused stand up comedy with a lecture.

  • @ixaazan1696
    @ixaazan1696 4 года назад +1

    Gem Talk 💐

  • @trevorNYC
    @trevorNYC 9 месяцев назад

    This has aged like fine milk, RE Okta security. On an unrelated note, I'm 12 minutes in and I've learned nothing.

  • @tenminutetokyo2643
    @tenminutetokyo2643 4 года назад +2

    Equifax outsourced to India Inc, that’s how their breach was enabled.

  • @2minvlog
    @2minvlog 3 года назад +3

    you wasted 30 minutes of time in my life.