Yilia LinforAPI7api7.hashnode.dev·Nov 14, 2024API7 Enterprise v3.2.16.4 Supports Webhook/Email Alerts NotificationsTo address the surge in enterprise data volume and the increased complexity of system monitoring, API7 Enterprise has fully upgraded the alerting functionality in version 3.2.16.4. The new version introduces contact points that allow users to integra...Discuss·10 likesalerting
Treblletrebllemakers.hashnode.dev·Nov 14, 2024The Hidden Dangers of API Security in Mobile AppsAs a backend PHP developer and a security consultant, the only thing that terrifies me more than a SPA on top of a stateless API is a mobile app! Authentication (and authorization) in a traditional PHP app is relatively easy: give the user a secure c...Discussapi security
Yilia LinforAPI7api7.hashnode.dev·Nov 7, 2024API7 Enterprise v3.2.16.3 Integrates with AWS Secrets ManagerIn API7 Enterprise, you may store a large amount of sensitive information, such as SSL certificates and private keys, usernames and passwords of consumer authentication credentials, and that required by certain plugins to connect to external systems....Discuss·10 likesapi security
Oluwajuwon Faloreoluwajuwonfalore.hashnode.dev·Oct 26, 2024Rate Limiting in Golang: Understanding Fixed and Sliding Windows AlgorithmImagine you're at an amusement park waiting for a ride. Only a certain number of people are allowed to board each hour. If the line gets too long, anyone arriving has to wait until the next hour before they can board. This idea of restricting access ...Discuss·10 likes·29 readsgolang
Yilia LinforAPI7api7.hashnode.dev·Oct 23, 2024Apache APISIX Integrates with open-appsec WAFIntroduction open-appsec WAF is excited to announce a new integration with the open-source API gateway Apache APISIX. This new collaboration between the open-appsec and API7 teams now allows users to protect their web APIs and other web services expo...DiscussApache APISIX
Niranjan A Sniranjan-as.hashnode.dev·Oct 22, 2024Crucial API Security Guidelines for Developers 🔒In today's digital ecosystem, APIs are the backbone of web and mobile applications, enabling seamless communication between systems. However, with the increased reliance on APIs, ensuring their security is more important than ever. A security breach ...Discuss·47 readsAPIs
Anish GandhiProanishgandhi.com·Oct 22, 2024Bubble.io Tips - 31. Privacy Rules Comparing One thing's Data with Another thing's Data Let me explain the problem here: In Bubble.io, a privacy rule like "This thing's salesforce is the current user's salesforce" can be risky if the "salesforce" field is empty for b...Discuss·65 readsBubble.io Tipsbubble.io
Nile Bitsnilebits.hashnode.dev·Oct 14, 2024How To Build Secure Django Apps By Using Custom MiddlewareIn today's digital world, when data breaches and cyber threats are more common than ever, developing safe online apps is essential. Django is a well-known and powerful web framework with integrated security measures. However, you might need to add mo...Discuss·32 readsDjango
Atharv Sankpalatharvsankpal7.hashnode.dev·Oct 4, 2024Access Tokens and Refresh TokensAccess Token The Access Token is a small piece of data that contains user identity information, such as email, name, and user ID (_id). This token typically has a short lifespan, ranging from 5 to 15 minutes. Due to its comprehensive user information...DiscussToken Management
Sainath Ramanathansainathr.hashnode.dev·Sep 26, 2024Best Practices for Securing API EndpointsRecently, I have seen a lot of news about API security breaches and data exposure. I will not dissect the incident but let us take that as learning, and see what we can do to improve the security. Without further ado, let me jump into the core aspect...Discuss·1 like·75 readsAPIs