-
Report details
-
9
Figures
-
0
Tables
-
2
Executive Summary
-
4
Introduction
-
20
Research Findings
-
6
Application Development Modernization Necessitates Cybersecurity Modernization
-
6
API Growth Is Exacerbating Security Risk
-
3
API Security Incidents Are Pervasive, Resulting in Many Challenges and Shortcomi…
-
Building an Effective API Security Strategy Involves a Variety of Tools and Deve…
-
5
Organizations Are Committed to and Investing in Solidifying API Security Posture
-
1
Conclusion
-
Research Methodology
-
Respondent Demographics
|
Research Report: Securing the API Attack Surface
Aug 24, 2023
by
Melinda Marks
Organizations across industries improve their productivity, innovation, and customer service with an increase in web, mobile, and cloud applications leveraging microservices architectures. But this brings an increase in APIs connecting application components and resources. Organizations rate APIs as the element in the cloud-native stack most susceptible to attack, and attacks stemming from insecure APIs were the most commonly identified cybersecurity incident tied to cloud-native app development over the last 12 months. As the number of APIs continues to grow, security risk increases.
As a result, organizations need effective API security solutions to reduce risk as cloud-native development scales and help their teams discover, manage, configure, monitor, and protect their APIs to keep pace with modern software development. To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 397 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and managing API security solutions.
Page Count: 31
Table of Contents
-
Executive Summary
(2)
-
Introduction
(4)
-
Research Findings
(20)
-
Application Development Modernization Necessitates Cybersecurity Modernization
(6)
-
API Growth Is Exacerbating Security Risk
(6)
-
API Security Incidents Are Pervasive, Resulting in Many Challenges and Shortcomings
(3)
-
Building an Effective API Security Strategy Involves a Variety of Tools and Developer Participation
-
Organizations Are Committed to and Investing in Solidifying API Security Posture
(5)
-
Conclusion
(1)
-
Research Methodology
-
Respondent Demographics
|
Other Users Also Viewed
Aug 25, 2023
This Complete Survey Results presentation focuses on the ongoing increase in APIs connecting application components and resources and the subsequent impact, including the top API security challenges, the API-related security incidents organizations…
|