SHARE
Facebook X Pinterest WhatsApp

Report: APIs Are a Serious Vulnerability

thumbnail
Report: APIs Are a Serious Vulnerability

The concept of business, technology, the Internet and the network. A young entrepreneur working on a virtual screen of the future and sees the inscription: API

Businesses must compile a comprehensive inventory of APIs and have visibility into the traffic within each API to protect data and business processes from abuse and theft.

Jun 15, 2023

A recent report from Neosec has highlighted just how severe the disconnect is between the perceived API security practices and the reality of security challenges in organizations. The report—co-sponsored with Enterprise Management Associates (EMA) and entitled “API Security: Debunking the Myths”—has revealed that weaknesses caused when organizations focus more on external APIs and neglect authenticated B2B APIs create a false sense of security. This weakness causes organizations to lack the ability to discover and document all APIs in use, leaving them vulnerable to attacks.

EMA’s research indicates that nearly all respondents expose applications to the internet via application programming interfaces. Because 98.3% are experiencing increases in their usage, this is a critical security weakness. The report also shows that they contain sensitive data, with 80.8% of respondents saying that the data was personally identifiable information. However, 40.6% of organizations have less than half of their known APIs documented, and 25.3% have no visibility into which applications are processing sensitive data.

Gartner has already identified this issue as the most significant attack vector for 2022, and that trend is expected to continue into 2023. With weaknesses like those in Neosec’s report, we’ll likely see more serious attacks with far-reaching consequences. The ease of application programming interface implementation is a tremendous benefit for companies, but organizations need to be aware of the downfalls.

See also: APIs, Unlike Diamonds, Sometimes Are Not Forever

Many organizations aren’t acting fast enough to close loopholes

While 97.4% of respondents have a plan to protect their APIs, 52.7% of organizations plan to initiate a project to execute the plan this year, indicating that APIs remain unprotected today. The report suggests that a modern API security solution should be able to discover and document all APIs in use, monitor internal machine-to-machine APIs for misuse, and have threat-hunting abilities.

However, Neosec emphasizes the importance of compiling a comprehensive inventory of APIs and having visibility into the traffic within each of them to protect data and business processes from abuse and theft. This would help remove these security vulnerabilities and allow companies to take full advantage of application programming interface benefits.

thumbnail
Elizabeth Wallace

Elizabeth Wallace is a Nashville-based freelance writer with a soft spot for data science and AI and a background in linguistics. She spent 13 years teaching language in higher ed and now helps startups and other organizations explain - clearly - what it is they do.

Recommended for you...

Fastvertising: What It Is, Why It Matters, and How Generative AI Amplifies It
The Most Important Question in Operational AI: Show Me Where It Actually Works
Stephen Ochs
Jan 21, 2026
Model-as-a-Service Part 1: The Basics
If 2025 was the Year of AI Agents, 2026 will be the Year of Multi-agent Systems

Featured Resources from Cloud Data Insights

Excel: The Russian Tsar of BI Tools
Real-time Analytics News for the Week Ending January 24
Beware the Distributed Monolith: Why Agentic AI Needs Event-Driven Architecture to Avoid a Repeat of the Microservices Disaster
Ali Pourshahid
Jan 24, 2026
The Key Components of a Comprehensive AI Security Standard
Elad Schulman
Jan 23, 2026
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.