Galah Cyber
  • Services
    • Application Security
    • AppSec as a Service
    • API Security
    • Offensive Security
    • Penetration Testing
  • Podcasts
  • Events
    • Foundations of Application Security with Cole Cornford
  • Insights
  • Resources
    • Assessments
    • Application Security Maturity Assessment
    • 5 I’s of Application Security Assessment
    • Case Studies
    • Browse all Case Studies
    • On-Demand Webinars
    • Ship secure code faster
    • Trends in 2025 for Software Security
    • Use Cases
    • Browse all Use Cases
  • Contact
Select Page
Your Guide to the Top API Security Tools and Practices

Your Guide to the Top API Security Tools and Practices

by Cole Cornford | Sep 30, 2024 | API Security

APIs are the backbone of modern applications, allowing different systems to communicate. However, if not adequately secured, they can also open doors for potential cyberattacks. In 2022, Optus’ internal network compromised personal information, impacting nearly...
Understanding API Security: A guide for developers

Understanding API Security: A guide for developers

by Cole Cornford | Jul 24, 2024 | API Security

According to a recent Gartner report, by 2026, over 80% of Australian businesses are likely to incorporate Application Programming Interfaces (APIs) into their operations. Just like every other facet of software development, APIs come with security risks that can...
Top API security threats in 2024: What developers must know

Top API security threats in 2024: What developers must know

by Cole Cornford | Jun 28, 2024 | API Security

Application Programming Interfaces (APIs) support modern web and mobile applications by enabling seamless communication between systems. A report by Palo Alto Networks found that the average application uses between 26 and 50 APIs. This report also highlighted the...

Quick Links

  • Podcasts
  • Insights
  • Careers
  • Case Studies
  • Use Cases
  • Privacy Policy

Services

  • Application Security
  • AppSec as a Service
  • API Security
  • Offensive Security
  • Penetration Testing

Contact Us

  • Follow