
By Jackie Kahle | Article Rating: |
|
July 31, 2014 02:30 PM EDT | Reads: |
5,728 |

Andi Mann from CA Technologies recently pointed out that, at every turn, customers are interacting more and more with businesses through applications. "Think of real estate businesses like Trulia, Zillow and Realtor.com," he wrote in Wired's Innovation Insights. "Or think about restaurants. It used to be that we'd call a restaurant to make a reservation, or even drop in and make a reservation. Now it's all on-line, through OpenTable, or Foursquare." This is the emergence of the Application Economy, where the application becomes the primary point of contact between the business and the customer.
Much of this is being made possible through the use of Application Programming Interfaces (APIs) to link front-end applications to back-end information systems. This approach is exploding in popularity because it builds on well-understood techniques from the web and leverages some existing infrastructure.
But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally different and have an entirely unique risk profile that you need to manage.
Good API developers understand the threat profile of what they are designing. Unfortunately, many API developers come directly from a web design background, and may bring with them some bad habits. It's important to recognize that despite their common roots and sharing of infrastructure, web design and API design have separate goals and demand different approaches.
A new SlideShare posted by CA Technologies, How Risky are Your APIs?, explains the potential risks of APIs and highlights the three most common forms of attack.
The SlideShare is based on a recent eBooklet published by Scott Morrison of CA Technologies, Five Simple Strategies for Securing Your APIs, which not only goes into much greater detail on the threats but lays out five simple steps that organizations should be taking today to reduce their risk.
Published July 31, 2014 Reads 5,728
Copyright © 2014 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Jackie Kahle
Jackie is a 30-year veteran of the IT industry and has held senior management positions in marketing, business development, and strategic planning for major systems, software, and services companies including Hewlett-Packard, Compaq, and Gartner. She currently manages the strategy and execution of CA Technologies thought leadership programs. Jackie has an MBA from the Whittemore School, University of New Hampshire, a BA in Mathematics from New York University and is the Vice-Chair of the N.H. State Council on the Arts.
![]() Apr. 25, 2018 07:30 PM EDT Reads: 2,533 |
By Liz McMillan ![]() Apr. 25, 2018 07:00 PM EDT Reads: 13,851 |
By Liz McMillan ![]() Apr. 25, 2018 06:15 PM EDT Reads: 5,836 |
By Elizabeth White ![]() Apr. 25, 2018 06:00 PM EDT Reads: 4,531 |
By Pat Romanski ![]() Apr. 25, 2018 04:45 PM EDT Reads: 7,212 |
By Elizabeth White Apr. 25, 2018 03:15 PM EDT Reads: 1,904 |
By Pat Romanski Apr. 25, 2018 03:15 PM EDT Reads: 1,559 |
By Liz McMillan Apr. 25, 2018 02:30 PM EDT Reads: 1,871 |
By Elizabeth White Apr. 25, 2018 02:00 PM EDT Reads: 7,782 |
By Elizabeth White ![]() Apr. 25, 2018 01:45 PM EDT Reads: 4,331 |
By Elizabeth White ![]() Apr. 25, 2018 01:00 PM EDT Reads: 1,343 |
By Pat Romanski ![]() Apr. 25, 2018 12:45 PM EDT Reads: 8,940 |
By Yeshim Deniz Apr. 25, 2018 12:00 PM EDT Reads: 735 |
By Elizabeth White ![]() Apr. 25, 2018 11:30 AM EDT Reads: 7,263 |
By Liz McMillan ![]() Apr. 25, 2018 11:00 AM EDT Reads: 7,344 |
By Yeshim Deniz Apr. 25, 2018 10:45 AM EDT Reads: 1,217 |
By Pat Romanski Apr. 25, 2018 10:00 AM EDT Reads: 2,364 |
By Liz McMillan ![]() Apr. 25, 2018 09:30 AM EDT Reads: 2,235 |
By Yeshim Deniz Apr. 25, 2018 09:30 AM EDT Reads: 1,720 |
By Pat Romanski Apr. 25, 2018 06:15 AM EDT Reads: 1,866 |