API keys are often used to validate developer consumer API credentials. They are often strings of randomized characters that the developer is asked to keep safe. However, like a password, they shouldn’t be considered as a holistic security mechanism.

Related articles

Hiding and Securing Your API Keys

API keys are both incredibly powerful and extremely vulnerable. API key exposure can result in significant damage, both to a company and to the data it holds. As such, hiding and securing keys (as well as mitigating potential loss) is critical for any security plan in the modern API space. Today, we’re going to lo do whatever you want to update

Designing the Human Experience (From the Ground Up)

API consultant Leah Tucker s her ideas on designing APIs with the human experience in mind. A common question I heard at Nordic APIs Platform Summit in Stockholm and API the Docs in Amsterdam: what makes a developer portal successful? I’m going to attempt to answer it here. And I encourage other sassy experts to chime do whatever you want to update

APIs Will Usher in a Future of Connected Energy

Smart is the buzzword of this decade. There are smartphones, smartwatches, and even smart TVs… but there’s still a lot of things that aren’t smart. Take energy — why can’t we measure our usage habits, charge home batteries during off-peak times, or produce our own energy to with neighbors when they need it? These do whatever you want to update

API Security: A Gateway To Heaven

Because they power applications used by hundreds, thousands, and even millions of people, security is hugely important when creating APIs. Despite this, perhaps due to their now outdated reputation as niche products “just for techies,” there can be a bit of an air of complacency around API security. In the past, we’ve written broadly about do whatever you want to update

High-Grade API Security For Banks

Financial institutions occupy a special zone for APIs largely because of how stringent the regulatory compliance rulesets are. The data that financial institutions leverage are protected wiy by a variety of regulatory ordinances, and as such, this data has to be stringently controlled, secured, and managed – hence why high-grade API security is such a do whatever you want to update

3 Common Methods of API Authentication Explained

APIs handle enormous amounts of data of a wiy varying type – accordingly, one of the chief concerns of any data provider is how specifically to secure this data. The idea that data should be secret, that it should be unchanged, and that it should be available for manipulation is key to any conversation on do whatever you want to update