Recent talks on APIs


Ep. 14 - The Hidden Dangers of BOLA
Imagine an attacker effortlessly accessing sensitive user data—simply by modifying an API request. In Episode 14 of If Your APIs Could Talk, we dig deep into
Broken Object Level Authorization (BOLA), the #1 API security risk in the OWASP API Security Top 10 (2023), allows just that. This webinar unpacks how BOLA
attacks happen, from unauthorized data exposure to full account takeovers, and why traditional access controls often fail. You’ll learn how to detect and d…


Securing API Keys: The Hidden Threat Behind the U.S. Treasury Department Breach
In December 2024, a breach within the U.S. Treasury Department was traced back to a compromised API key. This attack underscores a growing security
vulnerability that many organizations overlook: unprotected API keys. API keys serve as digital passwords for applications, but when left unsecured, they
provide attackers with easy access to sensitive systems and data. In this informative webinar, we will dive into the critical role that API keys play in modern …


Secure, Manage, and Scale ServiceNow APIs to Power AI Agents
Did you know ServiceNow Workflow Data Fabric includes Boomi API Management? APIs are the modern bridges that enable seamless interaction between AI
agents, data, and workflows. With APIs powering the digital and AI economies, a scalable API management solution is critical for IT and business leaders to
control API sprawl, unleash business potential, and unlock AI-driven innovation with ServiceNow. Join ServiceNow’s Head of Product Marketing for Data & A…


AI-Enhanced API Testing: A No-Code Approach to Testing
AI-driven automation empowers QA teams to scale their testing practices effortlessly, enabling them to keep pace with rapid development cycles and the
ever-increasing demand for robust APIs. Watch to explore how artificial intelligence (AI) is transforming API test automation. This session will showcase how
teams without extensive coding expertise can simplify test case generation and make API testing accessible by leveraging proprietary AI, machine learning …


Kubernetes Orchestrated Postgres Databases: Why Storage Performance is Key
In an era defined by explosive data growth and relentless infrastructure demands, the need for agile, efficient solutions has never been greater. This webinar
delves into the transformative power of cloud-native, software-defined architectures, specifically focusing on building highly scalable and performant
database infrastructure. Webinar topics include: * The Data Deluge and the Cloud-Native Imperative. Discover how cloud-native principles and software-de…


Application Security ≠ API Security: Understanding the Differences & the Need for Both
Modern applications are built on APIs, yet traditional application security approaches often overlook this critical attack surface. While application security
focuses on code vulnerabilities, misconfigurations, and runtime protections, API security addresses the unique risks posed by API exposure, authentication,
data access, and business logic abuse. In this webinar, we'll break down the relationship between API Security and Application Security, highlighting where …


Take Your Reverse Engineering to Another Level with Ghidra
As the frequency of cyberattacks continues to rise, the ability to swiftly and effectively reverse-engineer malware is paramount. To equip you with the skills
needed, we are re excited to invite you to our webinar that delves into the depths of Ghidra – an indispensable tool for InfoSec professionals widely used for
malware analysis. The experts will showcase Ghidra's capabilities through the analysis of the Calypso malware. Throughout the session, our Kaspersky Glob…


API Trends Across Borders: Comparing Germany, UK, and The United States in Akamai's API Impact
Report
Explore the key findings from Akamai’s 2024 API Impact Report, which examines critical trends in API usage and security across Germany, the UK, and the
USA. As APIs increasingly dominate web traffic, they have become prime targets for cyber threats such as credential stuffing, bot-driven attacks, and data
exfiltration. In this on-demand session, we analyse the rapid growth of API traffic, the surge in API abuse, and how attack patterns vary across key global re…
Coming up next


Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…


Mitigating AI Security Risks in Content Generation: Securing API-Based AI Systems
AI-powered content generation introduces security risks, including data leakage, prompt injection, adversarial misuse, and compliance gaps. Companies
using AI APIs from providers like OpenAI and Claude must address these vulnerabilities to prevent unauthorized data access and model exploitation. This
session breaks down real-world attack scenarios, including users manipulating AI prompts to extract sensitive information and API endpoints being exploite…


Pioneering the Future of Data Platforms for the Era of Generative AI
In the era of generative AI, retrieval augmented generation (RAG) is emerging as a vital tool, enabling enterprises to capitalize on their data. As data evolves
and volumes grow exponentially, traditional storage solutions can no longer meet the rigorous demands of enterprise AI systems. GenAI inferencing has
become a rack-scale computing workload, necessitating robust, enterprise-grade infrastructure. Discover how NVIDIA is collaborating with storage trailblaz…


Intelligence & Insider Threats: Exploring & Mitigating Risk
In this exclusive on-demand webinar hear from industry leaders, including Patricia Stokes from the Security and Intelligence Community, Shawn M. Thompson
from Google Cloud/Mandiant, Babel Street’s Chief Strategy Officer John Weaver and GovExec’s George Jackson, on the complex challenges faced by today’s
intelligence professionals in identifying and addressing insider threats. These threats cripple infrastructure, cost millions, stymie compliance and ruin reputa…


The Consumer Duty: Ensuring Financial Resilience Through AI in Client Screening
In the dynamic landscape of financial crime compliance, financial institutions face ongoing regulatory challenges. The Financial Conduct Authority (FCA)
responded to this need by introducing the Consumer Duty, effective July 2023, to ensure accessibility of information for consumers regarding well-valued
products and effective problem-solving support. Compliance must not only meet regulatory standards but also enhance resilience in the face of uncertainti…


From silos to synergy: How tech companies can streamline collaboration and improve application
security
This webinar will focus on how tech companies can improve their application security posture by streamlining collaboration across teams. Speakers David
Lindner and Naomi Buckwalter will discuss the current state of collaboration between SecOps, product security, supply chain security, and CISOs. They will
share real-world examples and anecdotes to illustrate the challenges and benefits of cross-functional communication and collaboration. Key topics covered…


Mastering Insider Risk Management with Public Data Insights
Organizations and government agencies face a growing threat from insider risks, which can have far-reaching consequences for reputation, business
continuity, loss of life, and national security. To effectively safeguard against insider threats, organizations must adopt a holistic insider risk management
(HIRM) program. This webinar explores the critical elements of a HIRM program, emphasizing the pivotal role that publicly available information (PAI) monit…


Harnessing Cloud Storage to Build Smarter AI Agents
Your company’s data is a powerful resource—learn how to harness it with an AI agent designed to generate meaningful insights. In this deep dive,
Backblaze’s Pat Patterson will demonstrate how to build an AI agent that can query, analyze, and generate insights from company-specific data—all powered
by cost-efficient, scalable cloud storage. By registering to this event you agree to receive more information about Backblaze and possibly other partnership…
Attend Summits on APIs
Advancing Application Security Practices
Explore the latest trends in AppSec from cloud-native protection with service mesh to fortified API security, authentication, rate limiting, and vigilant
monitoring.
Strengthening Cyber Security with AI
AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…
The 2025 Threatscape
While traditional methods of attack such as ransomware, malware, and email phishing will persist, security strategies must now address emerging concerns
like the growing prevalence of AI and the near-universal employee use of mobile and IoT devices. Attend this Summit to gain insights from renowned indu…
Inside ITSM & Digital Transformation
IDC predicts that direct Digital Transformation (DX) investment will reach $6.8 trillion in 2023, and already a key driver of an organization's DX journey, ITSM’s
role looks set to grow even more in 2022. Yet knowing how ITSM can help deliver a successful Digital Transformation initiative is different to understanding t…
Containers in the Enterprise
Stay on top of containerization with leading orchestration products and best practices to secure and monitor your company's containers
Effective Application Security
Secure your application environment both on-premises and in the cloud with DevSecOps and the right tools and testing.
Watch series about APIs

If Your APIs Could Talk
Join our API experts monthly as we dig into the technical side of API security.

API Series: If Your APIs Could Talk
This is your comprehensive destination for everything related to API security covering topics from the importance of data storage to the role of AI in API
security.

App and API Security | Akamai
Applications run our world. But as applications and users proliferate, so do security risks. Discover the latest application and API attack trends in Asia-Pacific,
and gain actionable insights from our Akamai security experts to protect your business.

Si tus APIs pudieran hablar
Únase a nuestros expertos cada mes para profundizar sobre el lado técnico de la seguridad de APIs.

App & API Security | Akamai
Secure your applications everywhere, every time. Discover the latest application and API attack trends in Asia-Pacific and gain actionable insights from our
Akamai security experts to protect your business.

AI & API Security Series
This 3-part webinar series emphasizes the importance on AI-driven API security, covering threat detection, risk assessment, and real-time response through
insights, strategies, and a live demo.