• krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • Understanding your API attack surface: How to get started
    Home SecurityApplication Security Understanding your API attack surface: How to get started

    Understanding your API attack surface: How to get started

    Source Link

    We live in a world of cloud computing, mobile devices and microservices. Nearly every application we interact with is powered by APIs, often many, especially when dealing with the leading cloud service providers (CSPs), mobile applications and microservice environments. This makes APIs a critical part of an organization’s attack surface.

    Akamai estimates that roughly 83% of internet traffic is API-based. Other studies such as those from Salt Security state that API attacks increased over 600% from 2021 to 2022, and Gartner predicts that 90% of web-enabled applications will have broader attack surfaces due to exposed API’s. The latest study from Imperva claims that vulnerable APIs are costing organizations between $40 and $70 billion annually.

    Another critical part of the expanding API attack surface is the adoption of Kubernetes and microservices. A study recently found over 380,000 exposed Kubernetes API servers, which is concerning given that the Kubernetes API server is a core control plane component to container deployments. That said, very little attention is placed on API security, despite the reality that APIs act as the glue that powers the modern digital ecosystem.

    APIs are used to access and query data as well as perform activities such as enrichment and data modifications as part of processes. This means the APIs themselves must be secured as well as the data that is flowing through them.

    This reality emphasizes the need for both application and data security best practices when working with APIs. As with many other areas of technology, most organizations struggle with the simple task of making an inventory of their APIs. This means most lack visibility of what APIs they have, interact with, and are relevant to their attack surface.

    Organizations such as Resurface Labs and Traceable AI have begun targeting this problem, but much more work needs to be done. Here’s where organizations should begin to understand their API attack surface and its potential vulnerabilities.

    Copyright © 2022 IDG Communications, Inc.

    Related Articles

    Leave a Comment

    techhipbettruvabetnorabahisbahis forumutaraftarium24edueduseduseduedueduseduedueduedus
    casibom giriş adresi
    sugar rush 1000
    neyine giriş
    pinco giriş