Parasoft(link is external) is showcasing its latest product innovations at embedded world Exhibition, booth 4-318(link is external), including new GenAI integration with Microsoft Visual Studio Code (VS Code) to optimize test automation of safety-critical applications while reducing development time, cost, and risk.
API security should be a key part of any organization's security strategy today; however, it's often overlooked. APIs make up 83 percent of all web traffic, and they play a vital role in nearly all modern mobile and web applications, as well as containers and microservices. APIs are designed to be accessed by third parties, which exposes them to a broader spectrum of potential attacks compared to traditional web applications. And API attacks are increasing.
In 2022, API-based incidents cost organizations a staggering $75B(link is external), averaging $4.35M per breach(link is external). This number doesn't include the cost of fines or penalties, which can reach up to $1.19B(link is external).
Beyond these stark numbers, the true cost of these incidents is ultimately the impact on organizations' brand reputations. Recent widely publicized zero-day vulnerabilities like the infamous Log4J vulnerability(link is external)
have highlighted the extent of the potential damage — a bad actor only needs to get one payload in to access databases and internal systems, install ransomware and more, without an organization knowing. Even big names with huge security budgets like T-Mobile, USPS, Facebook, Equifax, and Venmo have all experienced high-profile API breaches in the past. However, many companies still fail to adequately invest in API security measures until they have been breached and the damage to their reputation and bottom line is done.
When building a strong API security strategy, organizations must ensure they cover the three main pillars of API security: Prevention, Detection, and Response. The secret doesn't lie within one approach or tool, it's the ability to have multiple layers of defense.
Prevention: What proactive measures can be taken to prevent security breaches?
There are many ways to proactively plan for threats against APIs, including ensuring authentication and authorization are up to date. The combination of authentication and authorization provides the means to identify individuals attempting to access APIs and determine what they are or aren't allowed to access.
Other proactive measures include data encryption, which is the process of encoding data so only authorized users can access it. Threat modeling is another structured way to identify and evaluate potential risks. This gives an organization a clear idea of existing and potential security threats. Next, vulnerability scanning is an important step to identify any obvious problem areas.
Additionally, implementing API gateway software secures the traffic between an API request and its execution, acting as an extra layer of API protection.
Finally, having security awareness training for teams, where there is a higher degree of security literacy and everyone in the organization can think about security on different levels, provides another proactive step to defending against bad actors.
Detection: How can teams ensure they know when a breach has occurred?
Observability is the name of the game here. Security teams need to have visibility over a constant flow of information to ensure timely detection. Ideally, they should attain this degree of visibility through a single platform—one tool that provides access to comprehensive security data, enabling teams to examine various events as a unified perspective to oversee everything, organize data, and spot any anomalies.
However, not every organization will possess an all-encompassing solution for detection. This is why it's crucial to ensure you have tools that incorporate logging, monitoring, rate limiting, and behavioral detection capabilities. Logging creates a clear record of what's occurring in systems — every call to the API, every error, every failure, etc. Monitoring for alerts when unusual behaviors occur allows teams to decide if a response is required. The number of alerts can become overwhelming, so automating the response for certain conditions is key to keeping the review of alerts manageable. Rate limiting restricts the number of requests an API can handle, controlling legitimate users' interactions and safeguarding against malicious attacks. Behavioral detection uses machine learning to oversee API traffic, closely examining user behavior patterns.
Response: What can organizations do to stop a breach and mitigate its impact?
If an organization does fall victim to an API security breach, teams need to swiftly identify, contain, and remediate the threat, while still providing continuous service to the rest of their customers.
In the event of an incident, it's crucial that everyone knows how and when to act. Establishing an instant response plan allows the procedures and plans to be laid out for each employee. Implementing tools that work to automatically block a threat as it is detected in real time further brings detection and response pillars together to mitigate risks as they are identified.
Finally, threat intelligence is a crucial part of any response plan, as security teams must comprehensively grasp the attacker's motives, tactics, and objectives during the attack, allowing them to thwart future attacks and improve security.
Cybercriminals will continue to exploit vulnerabilities for personal and financial gain, but that doesn't mean organizations should make it easy for them. An organization's approach to API security should no longer be checkbox compliance, but instead a strategy that enhances observability into their APIs, mitigates against potential security threats, and ensures readiness to address any issues or threats that may emerge.
Industry News
JFrog announced general availability of its integration with NVIDIA NIM microservices, part of the NVIDIA AI Enterprise software platform.
CloudCasa by Catalogic announce an integration with SUSE® Rancher Prime via a new Rancher Prime Extension.
MacStadium(link is external) announced the extended availability of Orka(link is external) Cluster 3.2, establishing the market’s first enterprise-grade macOS virtualization solution available across multiple deployment options.
JFrog is partnering with Hugging Face, host of a repository of public machine learning (ML) models — the Hugging Face Hub — designed to achieve more robust security scans and analysis forevery ML model in their library.
Copado launched DevOps Automation Agent on Salesforce's AgentExchange, a global ecosystem marketplace powered by AppExchange for leading partners building new third-party agents and agent actions for Agentforce.
Harness completed its merger with Traceable, effective March 4, 2025.
JFrog released JFrog ML, an MLOps solution as part of the JFrog Platform designed to enable development teams, data scientists and ML engineers to quickly develop and deploy enterprise-ready AI applications at scale.
Progress announced the addition of Web Application Firewall (WAF) functionality to Progress® MOVEit® Cloud managed file transfer (MFT) solution.
Couchbase launched Couchbase Edge Server, an offline-first, lightweight database server and sync solution designed to provide low latency data access, consolidation, storage and processing for applications in resource-constrained edge environments.
Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI.
Aviatrix® announced the launch of the Aviatrix Kubernetes Firewall.
ScaleOps announced the general availability of their Pod Placement feature, a solution that helps companies manage Kubernetes infrastructure.
Cloudsmith raised a $23 million Series B funding round led by TCV, with participation from Insight Partners and existing investors.
IBM has completed its acquisition of HashiCorp, whose products automate and secure the infrastructure that underpins hybrid cloud applications and generative AI.