Application Security & Online Fraud , Next-Generation Technologies & Secure Development

Managing the Risks Posed By APIs

Shreyans Mehta of Cequence Security on the API Security Landscape
Shreyans Mehta, co-founder and CTO, Cequence

APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder and CTO at Cequence Security, who offers insights on enhancing API security.

See Also: Panel: Threat Response Needs New Thinking

”There is a lack of visibility in the way the APIs are being exposed.” Mehta says. “It’s very important to bubble up the attack surface: What are the APIs that are exposed?”

In a video interview with Information Security Media Group at RSA 2020, Mehta also discusses:

  • Increasing the attack surface through APIs;
  • Fundamentals of API security;
  • Turning API security into a business enabler.

Mehta is co-founder at CTO at Cequence Security. He previously was architect and technical director at Symantec, where he led the development of one of the most advanced network security platforms and intrusion prevention technologies based on real-time packet inspection and cloud-based big data analytics. In partnership with VMware, he developed one of the first agentless IPS engines that transparently protect virtual machines.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.