We are touring the globe, teaching folks how to:
Discover internal and external APIs
Test them to ensure that they don’t suffer from vulnerabilities and risks like those described in the OWASP API Security Top 10
Use threat and entity behavior analytics to identify attacks, and then mitigate them to protect at-risk applications
Ready to learn more and have a little bit of fun?