In today’s world, being constantly connected to people and systems through devices such as smartphones, tablets and computers is pretty much a normal state of affairs. And this ‘always on’ situation will only increase over time - everything will talk to everything else: person-to-person, machine-to-person and machine-to-machine. While this opens up a world of opportunities, the downside is that more and more connections also mean more and more opportunities for attack and compromise. The question remains can you provide adequate security in a cloud age where everything is connected to everything else? The good news is that many of these interactions rely on an API (Application Programming Interface) to communicate to an application or system somewhere in the world. APIs have quickly become the primary channel for business transactions in most modern enterprises. When you type in a website address, for example, the request goes out to a remote server belonging to … [Read more...] about API security: gold rush or wild west?