According to researchers, 91% of security leaders will be making API security a priority, while 80% would like to gain more control over their APIs.
Experts Comments
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.
Be part of our growing Information Security Expert Community (1000+), please register here.
As hundreds of billions of dollars in online business rely on APIs to efficiently function, APIs continue to be a major target for malicious hackers looking to exploit weaknesses in these connection points. When keys and tokens are leaked, they end up on the dark web and are then used in automated attacks against API endpoints. Our research found that on many websites and applications, more than 75% of login requests from API endpoints are malicious. API attacks continue to grow because they
.....Read MoreAs hundreds of billions of dollars in online business rely on APIs to efficiently function, APIs continue to be a major target for malicious hackers looking to exploit weaknesses in these connection points. When keys and tokens are leaked, they end up on the dark web and are then used in automated attacks against API endpoints. Our research found that on many websites and applications, more than 75% of login requests from API endpoints are malicious. API attacks continue to grow because they are easier and more economical to mount while being harder to detect than legacy browser-based botnet attacks. Businesses can beat API bots by employing a new defensive methodology driven by machine learning, sophisticated behavior modeling, and a constant real-time feedback loop. Developers must take steps to ensure that API keys and security tokens are properly protected using key vaults.
Read LessLinkedin Message
@Ameet Naik, Security Evangelist , provides expert commentary at @Information Security Buzz.
"When keys and tokens are leaked, they end up on the dark web and are then used in automated attacks against API endpoints...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/api-security-is-top-concern-for-security-leaders-expert-thought
Facebook Message
@Ameet Naik, Security Evangelist , provides expert commentary at @Information Security Buzz.
"When keys and tokens are leaked, they end up on the dark web and are then used in automated attacks against API endpoints...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/api-security-is-top-concern-for-security-leaders-expert-thought