Posted on
in Presentations
APIs are the lifeblood of the cloud and app-based economies. A compromised API can prove to be an easy attack vector for cybercriminals. In addition, API vulnerabilities are bringing into question how organizations approach application security and the usefulness of web application firewalls (WAP) and encryption protocols. Join Techstrong Research’s analysts as they share their insights.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community