Noname Security, the provider of complete API security solutions, is announcing its integration with the 2023 OWASP API Security Top 10 risk categories, reaffirming its status as a leader in API security, according to the company. The full support of these security categories—which was backed by Noname in its 2019 iteration—enables Noname’s API Security Platform to continue to protect APIs against a variety of critical threats.
The OWASP API Security Top 10 details critical vulnerabilities that threaten API environments, acting as a guide for security platforms to implement successful threat detection and prevention.
Now natively supported by Noname, the 2023 OWASP API Security Top 10 enables Noname’s platform to detect related vulnerabilities across the widest possible set of sources, which include log files, historical traffic replays, configuration files, and more, according to the company.
Noname’s API security platform is now better equipped to handle the latest data risks, such as excessive data exposure, broken authentication, lack of resources, rate limiting, and more.
The OWASP API Security Top 10 has introduced three new categories to its list, which reflect the growing changes within the API security industry. Noname’s platform now detects vulnerabilities associated with:
- Unrestricted Access to Sensitive Business Flows (API6:2023)
- Server-Side Request Forgery (API7:2023)
- Unsafe Consumption of APIs (API10: 2023)
"APIs have many stakeholders, and frameworks like the OWASP API Security Top 10 allow diverse groups across teams to come together and speak the same language," said Oz Golan, CEO and co-founder of Noname Security. "The integration of the 2023 OWASP API Security Top 10 into our platform is a strategic step in helping organizations tackle API security concerns and incorporate API security as part of their broader application security conversations.”
To learn more about Noname’s platform and its adherence to the OWASP API Security Top 10, please visit https://nonamesecurity.com/.