
APIs under control
The speed at which fake news travels has endorsed application programming interfaces. The danger is there, but it's easier to avoid if we have the APIs under control.
The speed at which fake news travels has endorsed application programming interfaces. The danger is there, but it's easier to avoid if we have the APIs under control.
A large part of the user authentication protocols in the new digital age –both proprietary solutions in the hands of companies such as IBM or Oracle and open solutions like OpenID and OAuth 2.0– are based on application programming interfaces (APIs).
Using an optimal credential or authentication system is vital to ensure the security of an application programming interface. OAuth 2.0 has become the basic security protocol for mobile APIs development and for providing credentials to launch native applications. The basic HTTP access authentication method does not guarantee the same level of security.
Next 30 November Madrid will welcome leading experts in cognitive systems, cybersecurity and cloud computing. The event, organized by BEEVA and i4S with the collaboration of BBVA, will analyze the corporate technological landscape in depth.
Musoni, PayKey, Alegra, Kobra, Precognitive and Cambridge Blockchain are the winning startups in BBVA Open Talent 2016. Their fintech projects set out to transform the financial ecosystem in different areas such as authentication, blockchain, financial inclusion and the fight against fraud.