Resources
  • eBooks
  • Reports
  • Demos
  • Videos
|
  • Value Calculator
  1. Home
  2. Resources
  3. Videos
  4. API Threat Protection: Learning From Real Life Examples
Video

API Threat Protection: Learning From Real Life Examples

Every day, new data breaches occur and many of them happen through APIs.

Our goal in this session is to share pragmatic, directly actionable best practices for API threat protection. Taking real breaches as examples, we analyze what went wrong and explain how those breaches could have been prevented.

In this session, we will:
– Describe what API Security encompasses, and the different layers at which security must be applied.
– Provide an overview of the OWASP API Security Top 10
– Deep dive into recent breaches and bug bounties
– Share several approaches to secure your APIs, learning from the root causes of those breaches.

This session is not product-oriented, but rather action-oriented!

Speakers

Isabelle Mauny

Field CTO

42Crunch

Topics
API SecurityCustomer StoriesAPI Management
Share on Social
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2025