20% of developers and IT pros say API security breaches happen monthly 


API security is one thing that many safety groups fail to get proper. Within the more and more distant, fashionable work environments as we speak, there are such a lot of apps and companies that depend on APIs that analysts battle to find API security breaches and safe.

Earlier this week, API supplier Postman, launched its 2022 State of the API Report — which surveyed greater than 37,000 builders and API professionals — and located that 20% of respondents say API safety incidents or breaches occur a minimum of as soon as thirty days at their organizations.

In distinction, 51% of respondents additionally stated greater than half of their organizations’ growth effort is spent on APIs.

The findings recommend that organizations could require a higher-level method for figuring out and securing APIs in the event that they wish to forestall intrusions and scale back the possibility of data breaches.


MetaBeat 2022

MetaBeat will carry collectively thought leaders to provide steerage on how metaverse expertise will remodel the best way all industries talk and do enterprise on October 4 in San Francisco, CA.

Why is API safety a problem? 

In terms of the battle to safe APIs, it isn’t simply the size of apps and companies that are creating challenges. Additionally, it is the truth that many organizations are counting on less-optimized utility safety instruments to mitigate points on the API degree.

On the tempo fashionable enterprise environments transfer, organizations want options that may robotically uncover and classify APIs at scale if they need a correct notion of their danger posture.

As one Gartner API safety report, explains, “many API breaches have one factor in widespread: the breached group didn’t find out about their unsecured API till it was too late. For this reason, step one in API safety is to find the APIs which your group is delivering, or which it consumes from third parties.”

It’s a perspective that Postman’s new analysis seems to reaffirm.

“Corporations experiencing extra frequent API safety incidents seemingly have a shadow or printed APIs that don’t have the identical protections as different websites. They seemingly have extra legacy components of their setting and will not actually perceive the scope of their whole API panorama,” stated Abhinav Asthana, CEO of Postman.

The necessity for larger transparency and visibility over APIs can be elevated by the rising variety of cell apps.

“Many cell apps have various backend APIs used to help it and they’re usually ignored. Attackers have been abusing these backend cell APIs for fairly a while as a result they’re usually not secured and supply rather more useful content material. You’ll be able to defend what you don’t find out about,” Asthana stated.

The API Safety market 

One of many important gamers within the API safety market is Salt Security. Its answer makes use of an API context engine (ACE) that may uncover new APIs and vulnerabilities, whereas additionally providing testing for APIs in pre-production.

One other competitor is Noname Security with an API safety platform designed to find API vulnerabilities and misconfigurations, with automated detection and response capabilities.

Researchers anticipate the API management market to develop from $4.5 billion in 2022 to succeed in a worth of $13.7 billion by 2027 as extra organizations try to save ever-more advanced decentralized working environments.


  • What are the common API security risks?
  • What are API attacks?
  • What are the different types of attacks against APIs?
  • What is an API security?
  • Can an API be hacked?
  • What is API vulnerability?
  • Which API is more secure?
  • How do you test API security?
  • What happens if API key is exposed?
  • Why API security is important?
  • How do I secure my API gateway?
  • How do you break an API?
  • How do I encrypt API calls?
  • What is API fuzzing?

1 thought on “20% of developers and IT pros say API security breaches happen monthly 

Leave a Reply

Your email address will not be published. Required fields are marked *