past

webinar

OWASP API Top 10 Threats - Episode II

Episode II: Broken User Authentication, Excessive Data Exposure, Resources & Rate Limiting, and Broken Function Level Authorization

recorded on: 

August 27, 2020

10:00 am

PT

webinar recording coming soon!

Watch now

OWASP API Top 10 Threats - Episode II

Abstract

In this 4-part webinar series, Inon Shkedy (Head of Security Research, Traceable ; co-author OWASP API Top 10) explores the OWASP API Top 10 project and provides detailed explanations about the API threats documented in the OWASP project.

In this episode, Inon provides details about 4 API vulnerabilities:

  • Broken User Authentication
  • Excessive Data Exposure
  • Lack of Resources & Rate Limiting
  • Broken Function Level Authorization

Inon will explain how these vulnerabilities have been exploited in the wild, why developers write code that is vulnerable to them, and how attackers can take advantage of the situation for their own profit.

Speakers

Inon Shkedy

Traceable
Head of Security Research
No items found.

Register