APIs

From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface
John D. Boyle | | AI, AI attacks, APIs, Attack Surface, Cybersecurity, f5, LLM, model poisoning, multicloud, rsac, security, zero trust
Accelerate human-led innovation, automate the grunt work and make sure AI delivers real value without proliferating new security risks. ...
Security Boulevard

Contrast Security Combines Graph and AI Technologies to Secure Applications
Contrast Security today made available an update to its application detection and response platform that leverages graph and artificial intelligence (AI) technologies to provide security operations teams with a digital twin of ...
Security Boulevard

AI Agents and APIs: Understand Complexities Today to Authenticate Tomorrow
Lori Marshall | | Agentic AI, AI, AI agents, API security, APIs, Authentication, Automation, Development, security
The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical ...
Security Boulevard

Contrast Secures AI Applications and Modern Software | Forrester 2025 SAST Report | Contrast Security
Contrast Marketing | | AI Applications, APIs, Attack, Contrast Security, Forrester, Report, SAST, security, software, Vulnerabilities
A new report from independent research firm Forrester has several major findings. ...

Harness Adds Traceable WAAP to Secure Web Apps and APIs
Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments ...
Security Boulevard

Upwind Adds Ability to Detect API Threats to Cloud Security Platform
Upwind has added an ability to detect threats to application programming interfaces (APIs) in real time to its cloud application detection and response (CADR) platform, based on machine learning algorithms ...
Security Boulevard

How I Used Free Tools to Resource Jack API Keys
4 min readHackers don’t need elite skills to steal your cloud resources – just free tools, public code, and a little patience. The post How I Used Free Tools to Resource Jack ...

BeyondTrust Breach Exposes API Key Abuse Risks
3 min readWhen a single API key compromise spiraled into a broader attack, it exposed how overlooked non-human identities can become gateways for escalating threats. The post BeyondTrust Breach Exposes API Key ...

How the Auth0 and Aembit Integration Boosts Non-Human Access Security
3 min read The collaboration automates workload-to-workload access, simplifying security for API connections and reducing the risks associated with credential management. The post How the Auth0 and Aembit Integration Boosts Non-Human Access ...

Akamai Embeds API Security Connector in CDN Platform
Akamai Technologies has made available at no extra cost a connector that makes it simpler for cybersecurity teams to discover application programming interfaces (APIs) that organizations have exposed via its content delivery ...
Security Boulevard