11436 SSO

Technology

Technology
by Subra Kumaraswamy Jun 05, 2015
The recent Internal Revenue Service data breach, which used the “Get Transcript” API to access the agency’s data, highlights the increased sophistication of cyber attacks that aim to profit from taxpayers’ personal... Read more
The recent Internal Revenue Service data breach highlights the increased sophistication of cyber attacks that aim to profit from taxpayers’ personal information, and the importance of adaptive API security.... Read more...
606
Technology
by Olaf Domis May 13, 2015
Black Friday, Christmas, peak travel season—no matter what the event, there will come a time when your API infrastructure needs to meet increased business demand quickly. Without the proper, load-tested... Read more
To help you prepare for high-traffic events, this webcast offers a preparedness checklist and includes best practices to help you begin the planning and testing process.... Read more...
606
Technology
by Greg Brail May 12, 2015
In the last decade, the “API” pattern has grown to dominate interactions between clients and servers on the Internet. Many of the largest and most-used apps on the internet today are built atop APIs. APIs have even... Read more
The simplicity of APIs is often underappreciated. As new platforms, languages, and frameworks are developed, a good API remains useful and usable. It's the key to their success.... Read more...
606
Technology
by Shankar Ramaswamy and Marc Schreuder May 01, 2015
Writing software with the right balance of responsiveness, predictability, and reliability is a constant challenge. Overlay the environment of regular technology revolutions that disrupt the status quo, and you have a... Read more
Writing software in a constantly changing technology environment amounts to changing your rocket's engines and guidance systems in flight. Here are some tips on how to stay on the right trajectory—and get stuff done. ... Read more...
606
Technology
by Olaf Domis Apr 30, 2015
Threat protection and application access controls are key security mechanisms that protect APIs when exposed to internal or external users and developers. In this technical deep-dive webcast, Apigee's Subra... Read more
In this technical deep-dive webcast, we discuss API threats and the protection mechanisms that every API and app developer must implement for safe and secure API management. ... Read more...
606
Technology
by Alan Ho Apr 29, 2015
Bolt-on analytics are products that only solve one particular use case, and only pay lip service to integration with other enterprise analytical systems. As an analytics product builder, I cringe whenever an enterprise... Read more
Bolt-on analytics are products that only solve one particular use case, and only pay lip service to integration with other enterprise analytical systems. Here are five reasons why bolt-on analytics cause more headaches than they're worth.... Read more...
606
Technology
by Subra Kumaraswamy Apr 09, 2015
The Maginot Line is remembered as one of history’s most costly strategic blunders. France’s massively complex, heavily fortified, and expensive 940-mile line was built before WWII to keep Germany at bay. But France’s... Read more
Digital security strategies can exhibit a weakness similar to the infamous Maginot Line, as they’re often not designed to quickly adapt to new and unexpected threats.... Read more...
606

API Management Decision-Making Kit

Next Steps

 
 

Resources Gallery

News