Syndicated Blog

Escape – The API Security Blog
Learn about GraphQL security, API security, performance, testing and building production-ready APIs with the latest tools and best practices of the ecosystem.
Security experience: top-down vs bottom-up⎥Jeevan Singh (Rippling, Twilio)

Escape vs Burp Suite Enterprise

Explore why customers prefer Escape over Burp Suite Enterprise, weigh the advantages and disadvantages of both,and determine the best fit for you ...
Workshop: Custom Security Tests for API Security

Workshop “How to write custom security tests” – Main Takeaways

Discover the main takeaways from our latest workshop on how to write custom security tests for API security ...
Workshop: Custom Security Tests for API Security

Why security engineers need a new approach to identify business logic flaws

Learn why security engineers need a new approach to identify business logic flaws ...
The art and science of product security: A deep dive with Jacob Salassi

The art and science of product security: A deep dive with Jacob Salassi

Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
Introducing Escape rules - Rules that adapt for you

Introducing Escape rules – Rules that adapt for you

Discover how Escape rules are the new generation of custom security tests for your API security ...
Security experience: top-down vs bottom-up⎥Jeevan Singh (Rippling, Twilio)

Building security training for developers in 2024: Is it really worth it and how to proceed?

Discover the value of developer security training in 2024 and effective strategies for fostering a secure software development culture ...
Is Gen AI your new AppSec weapon?

Sensitive data exposure: How to prevent it and where do we stand in 2024

Explore the latest insights on sensitive data exposure in 2024 and learn effective prevention strategy for protecting your company's information ...
How to secure your API secret keys from being exposed?

How to secure your API secret keys from being exposed?

Learn about the dangers of API secret key exposure and discover our selection of prevention strategies ...
Introducing Agentless API Discovery & Inventory

What is a Shadow API? Understanding the risks and strategies to prevent their sprawl

Understand main Shadow API risks, and discover powerful strategies to curb Shadow API sprawl effectively ...
Developers and security training:  can they co-exist?⎜Laura Bell Main

Developers and security training: can they co-exist?⎜Laura Bell Main

Today, we’re excited to have an amazing guest, Laura Bell Main, join us. Discover with us: Can developers and security training really co-exist? ...