In part 1 of this series, we discussed some AWS services that work well with MuleSoft. Many of these are serverless and can be easily integrated with MuleSoft’s connectors. It’s important to understand the AWS services that work well with MuleSoft, and how they can be used in practice. …

There is a distinct difference between simply building an API and designing and developing an API that has the security features that allow it to reliably address the needs of the users. Here are some common API security mistakes to be aware of and helpful best practices for avoiding them.

In today’s digitally connected world, leading organizations need to proactively build, integrate, manage, and scale application ecosystem within and beyond their enterprise. For many large enterprises, it’s foundational for digital transformation.

IT decision-makers, such as CIOs, CTOs, and enterprise/integration architects, face pressure to revamp their integration strategy so they can…

Gartner reports that by 2022, APIs will be the most frequent target hackers will use to compromise data. API security, which should always be a concern of enterprises, requires a certain set of skills.

These skills are necessary for developing and implementing the solutions and strategies that can properly address…

Aaron Lieberman

Aaron’s passion for technology drives him to find innovative ways to help advance organizations through technology.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store