Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

EP62 Protect Modern Applications in the Cloud: Union of APIs and Application Security

EP62 Protect Modern Applications in the Cloud: Union of APIs and Application Security

FromCloud Security Podcast by Google


EP62 Protect Modern Applications in the Cloud: Union of APIs and Application Security

FromCloud Security Podcast by Google

ratings:
Length:
27 minutes
Released:
Apr 25, 2022
Format:
Podcast episode

Description

Guest: Etienne De Burgh, Senior Security and Compliance Specialist, Office of the CISO @ Google Cloud Topics: Why is API security hot now? What happened that made it a priority for many?  Is API security different from application security? Doesn't the first "A" in API  stand for application?  What are the real threats to exposed APIs? APIs are designed for automated use, so how do you tell automated use from automated abuse / attack? What are the biggest challenges that companies are having with API security? What are the components of API security? Is there a “secure by default API”? API threat detection? Just like cloud in general, API misconfigurations seem to be leading to security problems, are APIs hard to configure securely for most organizations? Resources: Google Cloud Security Summit  - come see us on May 17, 2022 “Securing web applications and APIs anywhere” (at our Security Summit) OWASP Top 10 for API Security “Best practices for securing your applications and APIs using Apigee”
Released:
Apr 25, 2022
Format:
Podcast episode

Titles in the series (100)

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.