MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / API Security – The backbone to a Digital World

API Security – The backbone to a Digital World

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

Noname Security’s surge in adoption can be attributed to its proactive approach to API security throughout the full software development lifecycle. Unlike most solutions in the market today that rely solely on traffic analysis to pinpoint active attacks, Noname Security analyzes configuration, traffic and code to identify the broadest set of API vulnerabilities — including misconfigurations and design flaws.

We speak with NoName’s CISO, Karl Mattson, a cybersecurity leader and innovator with over 25 years’ experience leading innovative and diverse teams of technology and security professionals in financial services, retail and federal government.

Previously, Karl served as the Chief Information Security Officer (CISO) for PennyMac Financial Services and City National Bank. He has a track record of providing CEOs, CTO and investors in cybersecurity on strategies for product, market and customer success.

Recorded 13 April 2022

#APIsecurity #noname #cybersecurity #AppSec

OTHER VIDEOS IN THIS SERIES

mm32
November 13, 2025
Zoe Thompson, Head of Critical Infrastructure Protection at Thales Cyber Security, shares insights into how Thales is strengthening cybersecurity across Australia’s vital sectors — including energy, water, and telecommunications.Watch Now
mm23
November 13, 2025
Nick de Bont, Chief Security Officer at Thales, shares his perspective on safeguarding Australia and New Zealand’s critical infrastructure — from strategic defense sites to high-security manufacturing facilities.Watch Now
mm1
November 13, 2025
Mitchell Loughlin, Director of Risk and Resilience at Thales Cyber, explores the growing complexity of managing supply chain risks in today’s global environment.Watch Now
mysec11
November 13, 2025
Omer Grossman, Chief Trust Officer at CyberArk, discusses the evolving landscape of identity security, noting the global shift from traditional perimeter-based defenses to a comprehensive zero-trust framework.Watch Now