In the third and penultimate video of this series, Mike Elissen, Sr. Developer Advocate at Akamai and expert in cybersecurity, dives deeper into API Manipulation. Learn about common ways hackers will try to exploit your API microservices by manipulating requests and data that can cause all sorts of issues for your business.
Chapters:
0:00 - Introduction
0:24 - Broken Level Function Authorization
2:42 - Injection Attacks
4:29 - Mass Assignment
6:11 - Conclusion
New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/akatube
Check out the Linode API documentation here → https://www.linode.com/docs/api/
Learn more about cybersecurity here → https://www.linode.com/docs/guides/se...
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_co...
#Linode #Akamai #APIs #cybersecurity #APImanipulation
Product: Linode, Akamai, API Security; Mike Elissen;
Watch video API Manipulation and Injection Attacks | Build a More Secure API With These Vulnerabilities in Mind online without registration, duration hours minute second in high quality. This video was added by user Akamai Developer 11 August 2022, don't forget to share it with your friends and acquaintances, it has been viewed on our site 2,525 once and liked it 70 people.