[cs_content][cs_element_section _id=”1″][cs_element_row _id=”2″][cs_element_column _id=”3″][cs_element_text _id=”4″][/cs_element_column][/cs_element_row][/cs_element_section][cs_element_section _id=”10″][cs_element_row _id=”11″][cs_element_column _id=”12″][cs_element_button _id=”13″][/cs_element_column][/cs_element_row][/cs_element_section][cs_element_section _id=”19″][cs_element_row _id=”20″][cs_element_column _id=”21″][x_blockquote cite=”” type=”left”]When and where?[/x_blockquote][cs_element_text _id=”23″][x_blockquote cite=”” type=”left”]Schedule[/x_blockquote][cs_element_text _id=”25″][/cs_element_column][/cs_element_row][/cs_element_section][cs_element_section _id=”31″][cs_element_row _id=”32″][cs_element_column _id=”33″][cs_element_button _id=”34″][/cs_element_column][/cs_element_row][/cs_element_section][/cs_content]
![](https://equilibrium-security.co.uk/wp-content/uploads/2024/06/Website-logo-image-16.png)
OWASP Top 10 API: The Evolution of API Threats
If you’re tasked with leading the security testing for your organisation’s web applications, you’re probably well-acquainted with the OWASP Top 10. But have you updated