Make sure it's turned on so that pingidentity.com can work properly.
Gaining a Hacker's Perspective of API Vulnerabilities
There are many things we can learn from hackers, but asking them out for coffee isn’t exactly an option. We do know that they are targeting APIs at an increasing rate for the direct access they provide to systems and data. Unfortunately, most API management solutions focus their logging, reporting and analytics capabilities on the performance of APIs. While valuable to business and operations leaders, these don’t provide the details necessary to uncover methods hackers are using to abuse APIs, exfiltrate data and take over accounts.
Learn where your APIs are most vulnerable and the best tools and processes you can put into place to provide increased visibility, enabling you to detect and block threats to your API infrastructures.
You’ll hear from “red teaming,” penetration testing, and API security experts who will go through best practices on how to monitor, log and report your API activity to understand hacking behavior and prevent it in the future. Attendees will be able to ask questions and come away with a better understanding of:
Methods hackers use to uncover API vulnerabilities
Traffic you should be logging to detect hacking behavior
Information forensic and compliance reports must contain
AI based solutions which can provide increased visibility