CISOs shift from perimeter security to API security
My first-ever
contribution to CSO Online looks at the shifting landscape, from perimeter-based security to API security, and how CISOs are responding.
API attacks are on the rise. But traditional security approaches like endpoint detection and response (EDR) can miss this vector entirely.
Excited to share my first-ever contribution to CSO Online today, which looks at the shifting landscape, from endpoint security to API security, and how CISOs are responding. You can read it here.
In a nutshell, malicious traffic may look like normal traffic, but legacy perimeter-based defenses miss business logic gaps and systemic authentication and authorization issues.
To respond, CISOs are using a combination of API governance frameworks, inventory management, API gateways, strong identity and authorization, and other techniques.
I'd love to write more for this publication, but it takes connecting with the right sources. If you're a CISO or work with one and have an interesting perspective to share, feel free to
get in touch.











