The API Backdoors To Your Data

ON-DEMAND

The adoption of APIs for application development has left a few key backdoors open that allow attackers to access your data. Watch this webinar to hear about a few examples of applications that expose data via their APIs and some unintentional services that often get exposed in today’s environments. Ensuring data security requires an understanding of all the ways that data can be accessed and all the ways that data may end up accidentally being sent in transaction responses.

Hear from Jason Kent, Global Hacker in Residence at Cequence on:

  • Default API endpoints that accidently get left on and how to find them.
  • Requests and Responses in APIs that bleed data.
  • Authentication paradigms that helped in web site security that don’t work in API security.

SPEAKERS FOR THIS WEBINAR

Jason Kent
Hacker in Residence at Cequence Security         


© 2025  Cequence Security, Inc. All rights reserved. 

Linkedin
YouTube
Twitter