From Zombies to Legacy or Shadow APIs, it’s time to remediate your lost APIs

March 27, 2024 William McKinney

The largest attack vector in most organizations is unmanaged, unsecured APIs. The ones you do not know about today. The ones not in your inventory of API assets. Whether you call them zombies, shadow APIs, or legacy assets, the race

A propos de l'auteur

William McKinney

William McKinney is the Senior Director, Platform Marketing. William is an experienced marketing executive responsible for creating data-driven marketing programs and positioning Axway's Amplify Platform in an intensely competitive environment. In this role, he helps enterprises clarify their API challenges, bridge the gap between IT and business, and design innovative digital experiences – for their own teams as well as their customers. Specializing in B2B solutions to Fortune 1000 companies, William’s previous experience includes delivering results for IBM, HP, and JD Edwards. He enjoys simplifying the complex in a way that helps leaders turn ideas into action with measurable results. William loves the outdoors and enjoys hiking, biking, and camping. A graduate of Baylor University, he lives in Littleton, Colorado.

Plus de contenu de William McKinney
Article précédent
Different types of APIs explained: styles, protocols, audiences + real-life examples
Different types of APIs explained: styles, protocols, audiences + real-life examples

Depending on how you want to categorize them, there are several different types of APIs, and they have vari...

Article suivant
Bringing federated API management to life with expanded Amplify Agents
Bringing federated API management to life with expanded Amplify Agents

Agents are the secret sauce of Amplify’s universal (or federated) API management capability. They are the r...