How to Tame API Risks and Secure Your Digital Domain

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

We are excited to announce that we are bringing AppWorld 2025 online in partnership with Infosecurity Magazine. Following four successful in-person events, we are hosting solution keynote sessions, giving you virtual access to select insights and discussions from the live stage.

The applications you deliver today rely heavily on APIs. 92% of attacks F5 sees across our customers' applications are targeted specifically at these types of endpoints.

As complex architectures proliferate with connected ecosystems through APIs and third-party integrations, they’re creating a precarious “ball of fire,” which is further exacerbated by the rapid adoption of AI.

Partnering with F5, you can gain valuable insights into risks such as application vulnerabilities and tame your ball of fire to safely deploy modern and emerging AI apps.

See how F5 can empower your security team to protect your existing apps and APIs – uncovering weaknesses across your digital estate and enabling them to confidently secure your entire organisation.

In this webinar:

  • We will demonstrate how to identify and remediate vulnerabilities to improve your organisation’s security posture.
  • Learn what attackers see by scanning your public-facing digital properties so you can act before they do.

Speakers

Photo of Josh  Goldfarb

Josh Goldfarb

Field Chief Information Security Officer, F5

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for F5 here: https://www.f5.com/company/policies/privacy-notice. Please see Infosecurity Magazine’s privacy policy for more information.