SHARE
Facebook X Pinterest WhatsApp

API Security Needs to Be Backed by CXOs

5 Ways HTTP Protocol Can Address Emerging Cloud Threats I don’t think I’m off base saying this, but in our current Internet security culture, it seems like threats and other issues are taken seriously only when top management begins to recognize the problem. And as we know, C-level executives are almost always the last ones […]

Written By
SP
Sue Poremba
Aug 20, 2015
Slide Show

5 Ways HTTP Protocol Can Address Emerging Cloud Threats

I don’t think I’m off base saying this, but in our current Internet security culture, it seems like threats and other issues are taken seriously only when top management begins to recognize the problem. And as we know, C-level executives are almost always the last ones in the company to jump on the security bandwagon.

So, when CXOs do pay attention to a security problem, you can be pretty sure that it is the real deal.

Application program interface (API) security is one such threat. At the Black Hat USA 2015 conference earlier this month, Akana released the results of its survey, Global State of API Security Survey 2015, and it found that API security is becoming a C-level concern, even before it becomes, as ProgrammableWeb put it, a “full-blown crisis.”

According to the study, 75 percent believe that API security has to be a CIO-level concern. But at the same time, 65 percent said that processes aren’t in place to ensure that data accessed by applications is kept secure, and another 60 percent aren’t doing anything to secure API consumers.

The reason API security is lagging is because it is a relatively unknown quantity in the enterprise, and, as Roberto Medrano, EVP at Akana, said in a release, there seems to be a desire to see what other companies are doing for security before taking action.

Akana doesn’t need to look far to see that API security lapses are happening. A CSO article provided plenty of recent examples of companies like Starbucks and Snapchat with API-related vulnerabilities. The article added:

Why are APIs becoming the target of hackers? Because they’re everywhere, says Randy Heffner, API security analyst at Forrester Research. Just about every company is building APIs to support their web or mobile application because it allows them to innovate faster and bring outside content in.

API Security

And, like every other piece of software and hardware we use, APIs aren’t designed with security in mind. The rush to get them to market may also mean that they aren’t being properly tested for security, which makes them an easy target for hackers, because companies simply aren’t paying close attention. As ProgrammableWeb pointed out:

… [P]art of the problem with API security is that not only are there too many organizations that don’t have API usage policies in place, many of them also assume that a Web firewall will protect them from hacking.

The good news from the survey, though, is that it sounds like some at the executive level have begun to take notice that this is a real security threat and needs to be addressed. But, will they follow through?

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.