
So you have an API vulnerability. What does that mean and what can be done?
APIs have been around for decades, but they now power most of the internet. Here’s why they are important, and how to protect them.
APIContext partners with Akamai to expand advanced API monitoring adoption. Learn more >
APIs have been around for decades, but they now power most of the internet. Here’s why they are important, and how to protect them.
APIs are growing so fast, they are now more than half of most development efforts. But developer skills are not keeping up.
All developers have heard of a brute force attack, and maybe even tested it out themselves. However, just like how you check your logs for a brute force attack, we need to keep constant tabs on our API logs to detect security and privacy threats.
Developers who use your APIs probably use GET requests for PII more than they should, exposing personal and sensitive data in the header. Why? There are a few main reasons, all of which are preventable.
Peanut butter and chocolate, security and privacy. The perfect combination, but why?
If you thought your privacy compliance world got complicated when GDPR went into effect in 2018, get ready for a much more complicated landscape in 2023.
Personal data suffers from the Hotel California problem – you can check out any time you like, but you can never leave. This dynamic causes consumers to take increasingly drastic actions against brands in order to assert more control. There must be a better way.
KuppingerCole’s annual identity conference will feature a robust privacy discussion, led by our own CEO, Mayur Upadhyaya.
Data teams have worked hard over the past decade to build privacy and compliance into the data stack…but it’s still not enough to solve the privacy challenge.
Contxt awarded R&D grant from Innovate UK, the UK government’s innnovation agency. The grant will accelerate Contxt’s capability to redact and transform personal data in motion using machine learning.
For many risk and compliance teams, tracking personal data has become an exercise in frustration. It seems like an endless game of whack-a-mole, where more and more data sources, internal systems, databases, and rogue systems emerge.
Copyright APIContext © 2025. All rights reserved.