
Sign up to save your podcasts
Or
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can leave applications and APIs open to attack and what tools organizations need to effectively mitigate these threats.
This segment is sponsored by Imperva. Visit https://securityweekly.com/imperva to learn more about them!
Show Notes: https://securityweekly.com/asw-255
4.8
44 ratings
The majority of attacks are now automated, with a growing number of attacks targeting business logic via APIs, which is unique to every organization. This shift makes traditional signature-based defenses insufficient to stop targeted business logic attacks on their own. In this discussion, Karl Triebes shares how flaws in business logic design can leave applications and APIs open to attack and what tools organizations need to effectively mitigate these threats.
This segment is sponsored by Imperva. Visit https://securityweekly.com/imperva to learn more about them!
Show Notes: https://securityweekly.com/asw-255
7,898 Listeners
365 Listeners
626 Listeners
366 Listeners
265 Listeners
1,009 Listeners
7,879 Listeners
166 Listeners
181 Listeners
314 Listeners
74 Listeners
58 Listeners
127 Listeners
38 Listeners
43 Listeners