From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Protect API services with the WSO2 gateway

Protect API services with the WSO2 gateway

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Protect API services with the WSO2 gateway

- [Instructor] Contemporary application development is a far cry from the early days of software development where traditional procedural and object-oriented languages delivered monolithic solutions. Nowadays, applications are increasingly being delivered as micro-services often linked into an Agile delivery approach where the lines between development, test, and transition to production are blurred. The Cloud Foundry application's droplets approach is an example of how micro-services can be delivered. The cry of the day is fail fast, learn quickly, which indicates the role of identifying issues has extended from development to the users. While this may be a reasonable approach from a business functionality perspective, it has some significant implications when failing involves security. Our adversaries have a different war cry. Scan fast, penetrate quicker. And so pen testers are now working in the dynamically changing environment where a test one day may not be valid the next and…

Contents