Curated Video
A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Curated Video
A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Curated Video
A Detailed Guide to the OWASP Top 10 - API6:2023 Unrestricted Access to Sensitive Business Flows
In this video, discuss the risks and consequences of having unrestricted access to sensitive business flows in APIs.
Curated Video
A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Curated Video
A Detailed Guide to the OWASP Top 10 - API4:2023 Unrestricted Resource Consumption
In this video, explore how Unrestricted Resource Consumption can affect API performance and security, and how to protect against it.
Curated Video
A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Curated Video
A Detailed Guide to the OWASP Top 10 - API Endpoints
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction to APIs
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Curated Video
A Detailed Guide to the OWASP Top 10 - Section Intro
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention
This video explains the prevention of Server-Side Request Forgery.
Curated Video
A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Curated Video
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention
This video explains the steps to prevent security logging and monitoring failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures
This video explains OWASP 09 - security logging and monitoring failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - Software and Data Integrity Failures Prevention
This video explains how we can prevent software and data integrity failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #8 Software and Data Integrity Failures
This video explains A08: 2021 - software and data integrity failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention
This video explains how to prevent identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures
This video explains OWASP 07 - identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components Prevention
This video explains how to prevent vulnerable and outdated components from becoming an issue.
Curated Video
A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components
This video explains the A06: 2021 - vulnerable and outdated components.
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.