APIs and Data, Internet of Things and BREACH: A few words from our colleagues at Layer 7

Our colleagues at Layer 7 are posting insights on the world of APIs at the Layer 7 blog.

Our colleagues at Layer 7 are posting insights on the world of APIs at the Layer 7 blog. Last week the team was on a roll and posted some interesting content to coincide with API World and the start of National Cyber Security Awareness Month. Here’s a brief summary with links to the various blogs.

The Internet of Really Vulnerable Things

The first Tweet Chat hosted as part of National Cyber Security Awareness Month took place last Thursday. The participants were asked what they thought the Internet would look like in 10 years. There were interesting responses and you can read the transcript from the Tweet Chat here.

The @CASecurity response basically pointed to the Internet of Things and the hyper connectivity that we are starting to see today.  The response specifically pointed to a blog by Holger Reinhardt that kicked off National Cyber Security Awareness Month on the Layer 7 blog.  Holger’s blog was about the “Internet of really vulnerable things” and pointed out several vulnerabilities of connected things that aren’t typically thought of when it comes to Security, but perhaps should be.  Things like baby monitors, cars and once self-contained industrial systems.

How APIs Grease the Data Wheels

Last week Dimitri Sirota spoke at API World about APIs and data and his blog summarizes that discussion.  In the blog he draws a great analogy between APIs and data, showing how APIs unlock the value of data.

APIs unlock value by making information available to both developers and applications – and there is plenty of value in data. Unlocking the value of data benefits everyone, especially the new data barons who own, aggregate or analyze the data. If data is the new oil, APIs are the pipelines and tankers (I guess making Hadoop the refiner).

Can your API be BREACHed?

In this blog, Ronnie Mitra dissects a BREACH threat and examines that attack vector from an API perspective.

The API Academy on the Road

Our API Academy has a global roadshow planned for this quarter hitting cities in Europe and North America. The “roadshow” is a series of free workshops on API strategy, the principles of good API design and the keys to designing an API that will last. In addition to core aspects of effective API design, they will discuss the emerging trends of the developer experience (DX), the Internet of Things (IoT) and DevOps as they pertain to the API universe. You can see the schedule and more information at another blog from Ronnie.


Written by

Leanne Agurkis

Leanne Agurkis has spent more than 20 years in the communications field. She has worked…

Published in


View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!

    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website. http://goo.gl/sMgZ7n



  • king lear

    testing comment functionality, please do not publish this

  • Love the personal pic 🙂

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again 🙂 – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.