Blog

The importance of APIs in public cloud security

By | Date posted: October 11, 2018

 

“The importance of APIs in public cloud security: How secure do you think yours are? Jason Macy, CTO at Forum Systems explains why cloud security is not the only form of security required for systems and applications running in the cloud.

Most cloud services use their own rendition of API gateways to serve as the single-entry point into the application or service and to provide access control. Because APIs are exposed via API gateways, the gateway product itself has become the target of attack and compromise. Any hacker who can compromise the API gateway will have the ability to turn any “no” into a “yes”. The primary issue is that API gateway technologies were designed for integration, not for security. API security best practices instead use cyber-secure technology for API enablement, which performs the roles of an API gateway, but includes the IAM and cyber security technologies together within the gateway itself. This product technology is known as an API Security Gateway…

Read full article in Cloud Tech News

 

Product vs Toolkit – API and IAM Security

By | Date posted: September 11, 2018

 

“Product vs toolkit – What’s the difference when it comes to API and IAM security? Jason Macy, CTO at Forum Systems explains the difference between toolkits, agents, and adapters versus purpose-built security products.

The issue is that API and IAM technologies are toolkits based on frameworks, and adapter-based solutions. Marketing for API toolkits and IAM toolkits tout security features which state terms such as ‘encryption’ and ‘access control’ to lull customers into complacency. By stating security over and over, customers believe they are safe. In fairness, the toolkit vendors are not to blame since their marketing is driven out of the need to placate their customers’ concerns about security. As the cyber-threats continue to evolve, so does the marketing speak.

As IAM and API toolkits, frameworks, and adapter-based solutions continue to claim to be security products, customers must look beyond the marketing statements to understand the difference between a security product and a toolkit.

Read full article in SC Magazine

 

Broadcom Buys CA: What the Deal Means for CA API Gateway Users

By | Date posted: July 19, 2018

Last week, Broadcom announced its intent to acquire CA Technologies for nearly $19 billion. The news left Wall Street watchers incredulous and bewildered. Some analysts wondered about the two companies’ “business synergies,” while others questioned the “strategic logic” driving the deal.

As for us, what we’re most concerned about is the very thing that continues to drive our business: you, the end user.

Read more

eWeek- Forum Systems: Product Overview and Insight

By | Date posted: July 2, 2018

eWeek- Forum Systems: Product Overview and Insight

eWEEK has started a new IT products and services section that encompasses most of the categories that they cover on their site. In it, they spotlight the leaders in each sector, which include enterprise software, hardware, security, on-premises-based systems and cloud services. 

Forum Sentry API Security Gateway enables enterprises and government organizations to create code-free APIs that secure access to complex enterprise applications.

Read eWeek’s Product Overview of Sentry

 

How to build a secure API gateway – Network Security

By | Date posted: June 29, 2018

We invite you to download and read our CTO Jason Macy’s article featured in Network Security

How to build a secure API gateway 

In this era of hyper-connectivity, where almost every app or application relies on communication to a server or database somewhere, it has become harder than ever to secure an organisation’s systems, data and business-critical processes. Most of the major technology trends that have shaped IT over the past few decades – such as cloud computing, BYOD, IoT and even social media have resulted in more people and entities connecting to corporate IT assets than ever before.

Most of the major technology trends of the past few decades have resulted in ever-greater numbers of connections to corporate IT assets.

At the heart of these connections are application programming interfaces (APIs) that underpin almost every interaction or process and these have quickly become a prime target for attackers. Yet despite their growing prominence, they have largely remained the sleeping giant of our technology-led world, attracting too little attention when it comes to security

Download the article

API security: A modern day gold rush? – SC Media UK

By | Date posted: June 19, 2018

API security: A modern-day gold rush? Read what our CTO Jason Macy has to say about it in SC Magazine UK.


The problem with a bolt-on approach to API security is that these API frameworks and toolkits are inherently insecure by definition and were never designed with security in mind, but rather designed for integration.

APIs (Application Programming Interfaces) exist to allow enterprises to make their key resources available to developers, mobile apps, consumers and other companies. They are one of the main ways that technology companies integrate with each other and act as the gateways to all types of functionality. Think of them as being like the plug that goes into an electric wall socket – they provide a standardised way to access the power of an application.

Continue reading article

The API Security Gold Rush – Network Computing

By | Date posted: May 24, 2018

When it comes to securing the API aspect of networks, should security come before functionality? Jason Macy, CTO at Forum Systems explains why this is the only option

In today’s era of hyper-connectivity, securing your organisation’s systems, data and business-critical processes is harder than ever. As a result of the major IT trends of the last decade, in particular cloud, mobile and IoT, more and more people and applications are connecting to our IT assets than ever before. What’s more, the majority of these interactions are from untrusted entities outside of the organisation’s network perimeter, and almost every one of these interactions relies on an application programming interface (API) to communicate to an application or system, somewhere in the world.

Read full article in Network Computing

 

Risk is Reality: Our Take on the Recent Auth0 Vulnerability

By | Date posted: May 23, 2018

Last month, another major identity management vendor revealed a significant vulnerability. This time it was Auth0.

While conducting its own research, Cinta Infinita discovered the vulnerability in Auth0’s Legacy Lock API. The security firm noted it “was able to bypass password authentication when logging into Auth0’s Management Dashboard by forging an authentication token.”
Read more

5 myths of API security – CSO Magazine

By | Date posted: April 9, 2018

 

Our CTO Jason Macy chats with Terena Bell in her article, 5 Myths of API Security in the April edition of CSO Magazine

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

Myth #1: API security is a feature, not a technology

According to Jason Macy, chief technology officer at API security management provider Forum Systems, “Many vendors in the API product landscape talk about having features of API security.” In reality, he says, “claiming to have features that provide aspects of API security” is just like “claiming to have features that provide firewall or antivirus security.”

Read the full article

 

Forum Systems API Security Gateway Solutions Now Available on Carahsoft’s GSA Schedule

By | Date posted: April 4, 2018

API-driven vulnerabilities and hacks continue to make headlines, as seen with Coincube, Reddit/Mailgun and Roku. As a result, more people and organizations are (finally) awakening to the seriousness of the threat.

API security is critical to businesses with any type of digital presence, and the stakes are critical for the federal and public sector to protect data and applications. That’s why Forum Systems has continued to champion our unparalleled security-first pedigree and industry-first certifications with rigorous standards such as NIST FIPS 140-2 Level 2 and Common Criteria NDPP.
Read more