The Hunt for 'Shadow APIs'

The Hunt for 'Shadow APIs'

First you had ‘shadow IT,’ then ‘shadow cloud.’ Now enterprises are encountering ‘shadow APIs’ – and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.

In this interview with Information Security Media Group, Subbu Iyer, VP of Product Management, discusses:

  • The API security threat landscape;
  • Why API visibility is key;
  • Risks from ‘Shadow APIs.’

Subbu Iyer is VP of Product Management at Cequence Security. In this role, he is responsible for product strategy and roadmap for Cequence. Prior to joining Cequence, he was Senior Director of Product Management at Oracle. He was responsible for product management for Oracle’s Cloud Security products including Cloud Access Security Broker (CASB). Before joining Oracle, he was VP, Product Management at Bluebox Security, a mobile app security company, which was acquired by Lookout Security. Subbu has also held senior Product Management positions at Zscaler and Juniper Networks, where he launched the Junos Pulse product line. He has a diverse technology background spanning networking, application security and enterprise mobility.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.