API Security , Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

The Hunt for 'Shadow APIs'

Cequence Security's Subbu Iyer on the Need to Improve API Visibility
Subbu Iyer, Vice President of Product Management, Cequence Security

First you had ‘shadow IT,’ then ‘shadow cloud.’ Now enterprises are encountering ‘shadow APIs’ – and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.

In this video interview with Information Security Media Group, Subbu Iyer, VP of Product Management, discusses:

  • The API security threat landscape;
  • Why API visibility is key;
  • Risks from ‘Shadow APIs.’

Subbu Iyer is VP of Product Management at Cequence Security. In this role, he is responsible for product strategy and roadmap for Cequence. Prior to joining Cequence, he was Senior Director of Product Management at Oracle. He was responsible for product management for Oracle’s Cloud Security products including Cloud Access Security Broker (CASB). Before joining Oracle, he was VP, Product Management at Bluebox Security, a mobile app security company, which was acquired by Lookout Security. Subbu has also held senior Product Management positions at Zscaler and Juniper Networks, where he launched the Junos Pulse product line. He has a diverse technology background spanning networking, application security and enterprise mobility.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.