Blogs
Explore our blogs for everything you need to know about OWASP.
OWASP API security - Intro
This is the first in a series of blog posts that examine the OWASP API security top 10 threats in the context of API management. Read more →
OWASP API security - 2: Broken user authentication
Discover how to address broken user authentication vulnerabilities in APIs with insights from OWASP in this informative blog post. Read more →
OWASP API security - 3: Excessive data exposure
Learn how to mitigate excessive data exposure in your APIs with insights from OWASP in this essential blog post. Read more →
Guides & docs
Our interactive guides and comprehensive docs will help you stay ahead of security threats.
Tyk and OWASP top ten threats
OWASP provides a top ten threat awareness document compiled by security experts. Here's how Tyk guards against them. Learn more →
Videos
Watch our video tutorials for in-depth insight to unlock the full potential of OWASP-compliant authentication.
Back to the top ↑
Events
25 JULY
10am ET | 3pm BST
25 JULY
10am ET | 3pm BST
Back to the top ↑