Resources
  • eBooks
  • Reports
  • Case Studies
  • Demos
  • Videos
  • Value Calculator
  • Home
  • Resources
  • Videos
  • API Threat Protection: Learning From Real Life Examples
Video

API Threat Protection: Learning From Real Life Examples

Every day, new data breaches occur and many of them happen through APIs.

Our goal in this session is to share pragmatic, directly actionable best practices for API threat protection. Taking real breaches as examples, we analyze what went wrong and explain how those breaches could have been prevented.

In this session, we will:
– Describe what API Security encompasses, and the different layers at which security must be applied.
– Provide an overview of the OWASP API Security Top 10
– Deep dive into recent breaches and bug bounties
– Share several approaches to secure your APIs, learning from the root causes of those breaches.

This session is not product-oriented, but rather action-oriented!

Speakers

Isabelle Mauny

Field CTO

42Crunch

Topics:API Security
|
Customer Stories
|
API Management
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance
  • © Kong Inc. 2025