Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
All content for api connections is the property of Jon Scheele and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
API Security is critical for Cybersecurity with Chuck Herrin
api connections
43 minutes
1 year ago
API Security is critical for Cybersecurity with Chuck Herrin
In this conversation, Jon Scheele and F5's Field CISO Chuck Herrin discuss the critical importance of API security in today's digital landscape, where API traffic constitutes a significant portion of overall internet traffic. They explore the unique vulnerabilities associated with APIs, the relevance of OWASP's Top 10 for API security, and the evolving threat landscape that organizations face. The discussion emphasizes the need for visibility and discovery of APIs, the risks posed by third-pa...
api connections
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...