You've requested...

Explore the latest attack trends shining light on API threats

If a new window did not open, click here to view this asset.

Download this next:

Toughening up web and mobile application security

In the last years, organisations with highly integrated web applications and mobile apps have been able to ride the economic upheaval caused by the pandemic better than those with a less sophisticated online
presence.
While web applications enabled many organisations to remain operational during the pandemic, they also reinforced the need for strong app security in order to avoid cyber threats and malicious actors
who wish to penetrate corporate networks.
The reality is that web applications present too easy a vulnerability point because of what different teams do - and don’t do. In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe.

These are also closely related to: "Explore the latest attack trends shining light on API threats"

  • The State of Cloud Native Security

    The 2024 State of Cloud-Native Security Report highlights key challenges in today's security landscape. Organizations face issues like multicloud expansion (12 providers on average) and tool sprawl (16 security tools on average).

    Key findings include:

    · 71% report rushed deployments causing vulnerabilities
    · 100% use AI-assisted development, with 47% worried about AI code risks
    · 64% experienced more data breaches last year
    · 50% still use manual reviews for sensitive data

    The report discusses balancing security with development speed and adapting to AI and cloud complexities. Explore this report for insights to enhance your cloud security.

  • API Security Testing – Exposing Vulnerabilities with ReadyAPI

    With an accelerated shift to API-based architectures, it’s important to note that APIs can provide the easiest access point for a hacker who wants your data.

    API breaches are affecting companies of all sizes, and as more services handle sensitive data, these endpoints become even more valuable targets for hackers.

    So how can you secure your APIs and keep your sensitive data safe?

    This e-book offers an overview on how to protect your APIs:
    • How hackers leverage APIs
    • What is API security and how to protect your APIs
    • API security best practices
    • How ReadyAPI secures APIs

Find more content like what you just read:

  • Computer Weekly - 8 December 2020: Where next for Windows?

    In this week's Computer Weekly, Windows is still the most-used operating system in enterprises – we look at where Microsoft aims to take it next. We examine some of the key questions for CIOs for their 2021 IT strategy. And we analyse the best practice in preventing distributed denial of service (DDoS) attacks. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • The state of email security

    Email is notoriously susceptible to attacks, making email security a continuing necessity for organizations. In order to make sense of a crowded and complex market, this Omnia Universe report breaks down the most important information about the landscape as a whole, as well as leading vendors. Read on to learn more.

    Download

  • Technical guide: How to strengthen Microsoft email with human-centric security

    Microsoft 365 faces rising email threats as a leading cloud platform. This eBook details tips for enhancing security with email gateways and API solutions to combat phishing, BEC, and ransomware. Discover how to apply a multi-layered email security strategy before threats reach inboxes and how to enhance your Microsoft 365 environment.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • The future of API management: Key trends for IT leaders

    As enterprises accelerate digital transformation, API management has become increasingly complex. IT leaders must navigate an evolving landscape where efficiency, security, and modernisation intersect. This e-guide explores API management trends, including the challenges of API security, and the impact of genAI.

    Download

  • The CISO's guide to supply chain security

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

    Download

  • Discover proven strategies for successful API development

    This e-book explores API development challenges and best practices, focusing on a design-first approach, standardization, version control, and security. It shows how SmartBear API Hub offers a centralized platform for collaboration, documentation, and testing to enhance workflows and API quality. Read to transform your API strategy and innovate.

    Download

  • Benefits of Application Detection and Response (ADR) for your firm

    This white paper explores the need for Application Detection and Response (ADR) to protect modern applications and APIs. ADR provides continuous visibility, real-time threat detection, and automated response to secure the application layer. Read the white paper to learn how ADR can enhance your security posture and drive innovation.

    Download

  • How Harmony Email & Collaboration (HEC) API prevents email threats

    In March, Microsoft disclosed the CVE-2023- 23307 vulnerability, a threat impacting Outlook with a 9.8 CVSS Rating. Download this white paper to see how Checkpoint’s Harmony Email & Collaboration (HEC) API can prevent malicious emails from reaching the inbox.

    Download

  • Secure your web apps and APIs with these best practices

    For a 10-page guide to securing web applications and APIs, check out this white paper by Veracode.

    Download

  • Strategies to Secure Web Applications and APIs: Enterprise Strategy Group research

    Application environments are increasingly complex, with web apps cloud-resident, containerized, and API-driven. This has led to security challenges like tool sprawl, bot attacks, and DDoS. Learn how organizations are consolidating web application protection in this e-book.

    Download

  • Application protection tools and requirements: Enterprise Strategy Group research

    This Enterprise Strategy Group eBook examines how evolving web application environments have increased security challenges. It explores trends in DDoS, bot, and API attacks, and the need for consolidated web application protection. Read the eBook to learn how to better secure your web applications and APIs.

    Download

  • Developer’s guide to secure coding

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

    Download

  • Understanding Kubernetes Security from Development to Runtime

    This guide is your ultimate resource for learning the fundamentals of Kubernetes security and understanding the crucial importance of both shifting left and shielding right. Read on now to strengthen your Kubernetes security knowledge from development to runtime.

    Download

  • New research shows how ADR can close application security gaps

    As applications grow complex, traditional security tools miss critical blind spots exploited by attackers. This IDC InfoBrief explores Application Detection and Response (ADR) as a solution offering deeper visibility into application behavior, detecting zero-day threats, and reducing false positives. Discover why ADR is key for modern security.

    Download

  • What to look for in an email security provider

    Email is currently the number one attack vector, with hackers exploiting the medium to deliver malware, phishing, and other versatile attack types. To help you overcome the challenges presented by email threats, this buyer’s guide to email security breaks down what it means to be an effective email security solution. Read on to learn more.

    Download

  • Computer Weekly – 4 October 2022: Putting APIs to work

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

    Download

  • Why Passkeys Improve User Security & How To Implement Them

    Passkeys offer a secure alternative to traditional passwords, reducing vulnerability to phishing and social engineering attacks. This white paper explores how passkeys work, their benefits over passwords, and best practices for implementation. Learn how passkeys can enhance security and user experience. Stay ahead in authentication technology.

    Download

  • The Threat Prevention Buyer's Guide

    This Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.

    Download

  • Infographic: 5 cybersecurity predictions for 2022

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

    Download

  • CW APAC October 2023 – Buyer’s guide to IAM

    Identity access management tools are proving pivotal in the race to outwit cyber criminals. In this handbook, focused on IAM in the Asia-Pacific region, Computer Weekly takes a closer look at their capabilities, CyberArk's growth, the uses of automation and how ForgeRock enhances user experience.

    Download

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

    Download

  • The 2025 State of Secrets Sprawl

    GitGuardian's 2025 State of Secrets Sprawl Report reveals that nearly 24 million new hardcoded secrets were exposed on public GitHub in 2024 alone—a staggering 25% increase from the previous year. Read the full report to dive deeper into the widespread exposure of sensitive credentials and how to stay ahead of the risks.

    Download

  • Computer Weekly – 29 April 2025: Making divorce digital

    In this week's Computer Weekly, we talk to the CEO of the National Family Mediation charity about its tech overhaul and how divorce is going digital. The government's One Login digital identity system is under scrutiny over security problems – we examine the issues. Read the issue now.

    Download

  • How to stop email threats before they become compromises

    In this product overview, you’ll learn how you can use Proofpoint Core Email Protection to stop the broadest range of email cyberattacks, spam and graymail. Read on now to find out how you can build the best version of your security operations center.

    Download

  • Top 10 ANZ IT stories of 2021

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

    Download

  • Top 10 ANZ IT stories of 2022

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

    Download

  • Secure your code: Understanding the OWASP Top 10 for LLMs

    As generative AI expands, developers must tackle new security risks. This white paper explores the OWASP Top 10 for LLM applications, highlighting key risks. Discover effective mitigation strategies for each risk.

    Download

  • How a unified cybersecurity platform impacts time to detection

    This ESG Economic Validation shows how Trend Vision One reduces risk, improves threat detection and response, and boosts efficiency. Organizations saw lower breach likelihood, fewer alerts, better visibility, and cost savings. Read the report to learn how this unified security platform can enhance your cybersecurity posture.

    Download

  • Cyber Risk Exposure Management: Take control of your risk

    Trend Vision One's Cyber Risk Exposure Management offers continuous visibility to address expanding attack surfaces. By integrating attack surface management, compliance, and security posture management, teams can shift from reactive defense to proactive risk management. Discover how it reduces exposure and enhances resilience.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download

  • The 2025 Software Supply Chain Security Report

    ReversingLabs released its third annual Software Supply Chain Security Report, spotlighting mounting attacks on AI, Crypto, Open Source, and Commercial Software. The 2025 report compiles 12 months of data and research to identify trends in software supply chain risks.

    Download

  • The Passkeys Handbook

    This guide explores passkeys, the most secure alternative to passwords for protecting your online identity. Whether you are a curious user, a developer, or a software architect, this guide will help you understand the importance of passkeys, how they work, and how to integrate them into your applications.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • Computer Weekly – 19 September 2023: Securing Eurovision's online voting system against cyber attacks

    In this week's Computer Weekly, we discover how Once.net and Cloudfare defended the 2023 Eurovision Song Contest against cyber attacks. Our buyer's guide continues to look at integrating software-as-a-service applications, with the governance of SaaS connectivity to the fore. Read the issue now.

    Download

  • How AI is evolving the security life-cycle beyond manual operations

    Google Cloud's AI security vision shifts from manual to semi-autonomous security using Gemini and SecLM, a specialized API. This strategy tackles cyberthreats by automating tasks, enhancing threat detection, and offering security-specific AI, while keeping humans in critical roles. Read the white paper to see how Google empowers defenders.

    Download

  • CrowdStrike 2024 State of Application Security

    The CrowdStrike 2024 State of Application Security Report provides a candid look into how organizations are securing modern, frequently changing applications. It includes trends in application programming languages, deployment velocity and security review coverage, top challenges that application security teams face today, and more.

    Download

  • Protect your business from 5 common email-based cyberattacks

    Explore five real-world email attacks bypassing security tools: BEC, e-signature phishing, TOAD threats, payroll diversion, and supply chain compromise. Read the e-book to strengthen your defense against these threats, learn how cybercriminals use social engineering to target people and discover detection techniques to protect your organization.

    Download

  • Computer Weekly – 11 October 2022: Government bins IR35 reforms – what you need to know

    In this week's Computer Weekly, after the government scrapped its IR35 reforms, we examine what IT contractors need to know. With hybrid working, employee experience is a priority – we look at how it meshes with customer experience initiatives. And we assess the options for unstructured data storage in the cloud and on-premise. Read the issue now.

    Download

  • The average email incursion lasts 184 seconds

    An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.

    Download

  • Risk in the World of Identity Governance

    As the network perimeter expands, identity is the new enterprise security frontier. This white paper explores how identity governance and administration (IGA) can mitigate identity-based risks through prevention, detection, remediation, and prediction. Learn how IGA secures the dynamic enterprise perimeter.

    Download

  • Automated security testing for secure software development

    To find out how your teams can deliver more secure software faster, take a look through this white paper, "Leveraging Automation to Achieve DevSecOps for Secure Web Applications and APIs."

    Download

  • Securing generative AI with Identity

    This whitepaper highlights how generative AI boosts business productivity but introduces new security challenges. It stresses the need for a unified Identity and access management (IAM) strategy to protect sensitive data, ensure compliance, and reduce security risks. Read on now to unlock key insights.

    Download

  • Infographic: 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

    Download

  • Upload security: Understanding your posture & more

    Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.

    Download

  • Cloud Security 101: Best Practices & Self-Assessment

    In this eguide, review best security practices in the age of cloud, and read through two cloud security quizzes from industry experts.

    Download