Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/aa/5b/1aaa5bc6-acb8-fcc0-424c-67ca91c69a28/mza_9876840790847229241.jpg/600x600bb.jpg
api connections
Jon Scheele
18 episodes
1 week ago
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
Show more...
Technology
Business
RSS
All content for api connections is the property of Jon Scheele and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
Show more...
Technology
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/aa/5b/1aaa5bc6-acb8-fcc0-424c-67ca91c69a28/mza_9876840790847229241.jpg/600x600bb.jpg
API Security is critical for Cybersecurity with Chuck Herrin
api connections
43 minutes
1 year ago
API Security is critical for Cybersecurity with Chuck Herrin
In this conversation, Jon Scheele and F5's Field CISO Chuck Herrin discuss the critical importance of API security in today's digital landscape, where API traffic constitutes a significant portion of overall internet traffic. They explore the unique vulnerabilities associated with APIs, the relevance of OWASP's Top 10 for API security, and the evolving threat landscape that organizations face. The discussion emphasizes the need for visibility and discovery of APIs, the risks posed by third-pa...
api connections
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...