DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Security of many APIs leaves much to be desired

DigitalCIO Bureau by DigitalCIO Bureau
October 21, 2024
in Tech News
0
AI Could Soon Bypass Most Known Cybersecurity Measures
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

F5 has announced the findings of its 2024 State of Application Strategy Report: API Security, revealing concerning truths about the current state of API security across industries. The report highlights significant gaps in API protection, exposing them to potential threats that could jeopardize enterprise security and operations. These challenges are magnified by the rapid proliferation of APIs in today’s digital landscape.

The survey found that less than 70% of customer-facing APIs are secured using HTTPS (Hypertext Transfer Protocol Secure), leaving nearly one-third of these APIs completely unprotected. This is a stark contrast to the 90% of web pages that are now accessed via HTTPS, following the push for secure web communications over the past decade.

“APIs are becoming the backbone of digital transformation efforts, connecting critical services and applications across organizations,” said Lori MacVittie, Distinguished Engineer at F5. “However, as our report indicates, many organizations are not keeping pace with the security requirements needed to protect these valuable assets, especially in the context of emerging AI-driven threats.”

Key Findings of the Report Include:

  • Rapid growth and diverse environments: The average organization now manages 421 different APIs, with most hosted in public cloud environments. Despite this growth, a significant number of APIs—particularly those that are customer-facing—remain unprotected.
  • Evolving API uses and security needs: As APIs increasingly connect to AI services like OpenAI, the security model must adapt to cover both inbound and outbound API traffic. Current practices largely focus on inbound traffic, leaving outbound API calls vulnerable.
  • Fragmented responsibility for API security: The report reveals a divided responsibility for API security within organizations, with 53% managing it under application security and 31% through API management and integration platforms. This division can lead to gaps in coverage and inconsistent security practices.
  • High demand for programmable security solutions: Respondents ranked programmability as the most valuable API security capability, underscoring the need for real-time inspection and response to API traffic and threats.

Addressing the Gaps in API Security

To address these security gaps, the report recommends organizations adopt comprehensive security solutions that can cover the entire API lifecycle, from design through deployment. By integrating API security into both development and operational phases, organizations can better protect their digital assets against a growing array of threats.

“APIs are integral to the AI era, but they must be secured to ensure that AI and digital services can operate safely and effectively,” added MacVittie. “This report is a call to action for organizations to re-evaluate their API security strategies and take the necessary steps to protect their data and services.”

Tags: F5
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

by DigitalCIO Bureau
March 10, 2026
0
SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

SEI announced it has joined forces with IBM IBM to accelerate enterprise transformation through agentic AI and automation and modernize how it operates, innovates, and delivers value to clients—reinforcing...

Read moreDetails

SailPoint redefines identity security with new adaptive identity innovations

by DigitalCIO Bureau
March 10, 2026
0
SailPoint redefines identity security with new adaptive identity innovations

New AI-powered capabilities deliver real-time governance, secure the full spectrum of human and machine identities, and provide integrated threat management for the modern enterprise SailPoint, Inc. today announced...

Read moreDetails

TCS launches Gemini Experience Center in the US to help accelerate AI-powered manufacturing

by DigitalCIO Bureau
March 9, 2026
0
TCS launches Gemini Experience Center in the US to help accelerate AI-powered manufacturing

The seventh TCS GEC globally integrates Google’s Gemini models with TCS’ manufacturing expertise to help accelerate the adoption of Physical AI and build future-ready enterprises Tata Consultancy Services...

Read moreDetails

Accenture to Acquire Ookla to Strengthen Network Intelligence and Experience with Data and AI For Enterprises

by DigitalCIO Bureau
March 9, 2026
0
Accenture to Acquire Ookla to Strengthen Network Intelligence and Experience with Data and AI For Enterprises

Accenture has entered into an agreement to acquire Ookla, a global leader in network intelligence, competitive benchmarking and customer experience analytics. By integrating Ookla’s data products, including Speedtest,...

Read moreDetails

Infosys and Intel Deepen Strategic Collaboration to Unlock AI Value for Enterprises Globally

by DigitalCIO Bureau
March 9, 2026
0
Infosys and Intel Deepen Strategic Collaboration to Unlock AI Value for Enterprises Globally

Focus on scaling production-ready deployments, optimizing performance, and delivering measurable enterprise outcomes across industries with Infosys Topaz and Intel’s high-performance compute platforms Infosys and Intel announced the next phase of...

Read moreDetails
Next Post
ManageEngine IAM Solutions Recognized By Analyst Firms Gartner And KuppingerCole

ManageEngine IAM Solutions Recognized By Analyst Firms Gartner And KuppingerCole

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Automated Breach And Attack Simulation – Can You Deny Its Relevance?

Automated Breach And Attack Simulation – Can You Deny Its Relevance?

January 24, 2024

Google to invest 3 billion euros in European data centres

September 20, 2019

Optiva and Truphone to Deploy Cloud-Native OCS Solution on the Public Cloud

February 27, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?