27 February, 2020 Approov Serverless Reverse Proxy in the AWS API Gateway API Keys, Integration, Third Party APIs, API In my previous article, Using a Reverse Proxy to Protect Third Party APIs, I left you without a...
12 February, 2020 Using a Reverse Proxy to Protect Third Party APIs API Keys, Third Party APIs, API, API Abuse In this article you will start by learning what Third Party APIs are, and why you shouldn’t access...
17 January, 2020 Addressing Vulnerabilities and Abuse for Comprehensive API Security Business, API, API Abuse, API Security As APIs become a critical part of almost every business, the need to build a robust API security...
19 November, 2019 Securing Your API server with Approov and Cloudflare Integration, Mobile App Authentication, API Cloudflare is famous among developers as a leading CDN to efficiently deliver customer facing...
15 October, 2019 How to Protect Against Certificate Pinning Bypassing Mobile App Authentication, Repackaged Apps, Reverse Engineering, Threats Editor's note: This post was originally published in October 2019 and has been revamped and updated...
24 July, 2019 Improve the Security of API Keys API Keys, Mobile App Authentication, Reverse Engineering, API Securely identify your API Caller Dunnottar Castle As a developer, API Keys are typically issued to...