API Security , Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

The Hunt for 'Shadow APIs'

Cequence Security's Subbu Iyer on the Need to Improve API Visibility
Subbu Iyer, Vice President of Product Management, Cequence Security

First you had ‘shadow IT,’ then ‘shadow cloud.’ Now enterprises are encountering ‘shadow APIs’ – and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.

In this video interview with Information Security Media Group, Subbu Iyer, VP of Product Management, discusses:

  • The API security threat landscape;
  • Why API visibility is key;
  • Risks from ‘Shadow APIs.’

Subbu Iyer is VP of Product Management at Cequence Security. In this role, he is responsible for product strategy and roadmap for Cequence. Prior to joining Cequence, he was Senior Director of Product Management at Oracle. He was responsible for product management for Oracle’s Cloud Security products including Cloud Access Security Broker (CASB). Before joining Oracle, he was VP, Product Management at Bluebox Security, a mobile app security company, which was acquired by Lookout Security. Subbu has also held senior Product Management positions at Zscaler and Juniper Networks, where he launched the Junos Pulse product line. He has a diverse technology background spanning networking, application security and enterprise mobility.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ca-security.inforisktoday.com, you agree to our use of cookies.