SHARE
Facebook X Pinterest WhatsApp

Report: APIs Are a Serious Vulnerability

thumbnail
Report: APIs Are a Serious Vulnerability

The concept of business, technology, the Internet and the network. A young entrepreneur working on a virtual screen of the future and sees the inscription: API

Businesses must compile a comprehensive inventory of APIs and have visibility into the traffic within each API to protect data and business processes from abuse and theft.

Jun 15, 2023

A recent report from Neosec has highlighted just how severe the disconnect is between the perceived API security practices and the reality of security challenges in organizations. The report—co-sponsored with Enterprise Management Associates (EMA) and entitled “API Security: Debunking the Myths”—has revealed that weaknesses caused when organizations focus more on external APIs and neglect authenticated B2B APIs create a false sense of security. This weakness causes organizations to lack the ability to discover and document all APIs in use, leaving them vulnerable to attacks.

EMA’s research indicates that nearly all respondents expose applications to the internet via application programming interfaces. Because 98.3% are experiencing increases in their usage, this is a critical security weakness. The report also shows that they contain sensitive data, with 80.8% of respondents saying that the data was personally identifiable information. However, 40.6% of organizations have less than half of their known APIs documented, and 25.3% have no visibility into which applications are processing sensitive data.

Gartner has already identified this issue as the most significant attack vector for 2022, and that trend is expected to continue into 2023. With weaknesses like those in Neosec’s report, we’ll likely see more serious attacks with far-reaching consequences. The ease of application programming interface implementation is a tremendous benefit for companies, but organizations need to be aware of the downfalls.

See also: APIs, Unlike Diamonds, Sometimes Are Not Forever

Many organizations aren’t acting fast enough to close loopholes

While 97.4% of respondents have a plan to protect their APIs, 52.7% of organizations plan to initiate a project to execute the plan this year, indicating that APIs remain unprotected today. The report suggests that a modern API security solution should be able to discover and document all APIs in use, monitor internal machine-to-machine APIs for misuse, and have threat-hunting abilities.

However, Neosec emphasizes the importance of compiling a comprehensive inventory of APIs and having visibility into the traffic within each of them to protect data and business processes from abuse and theft. This would help remove these security vulnerabilities and allow companies to take full advantage of application programming interface benefits.

thumbnail
Elizabeth Wallace

Elizabeth Wallace is a Nashville-based freelance writer with a soft spot for data science and AI and a background in linguistics. She spent 13 years teaching language in higher ed and now helps startups and other organizations explain - clearly - what it is they do.

Recommended for you...

Beyond Procurement: Optimizing Productivity, Consumer Experience with a Holistic Tech Management Strategy
Rishi Kohli
Jan 3, 2026
Smart Governance in the Age of Self-Service BI: Striking the Right Balance
The AI Executive Order Creates Uncertainty, Not Clarity. Here’s How to Navigate It.
RTInsights Team
Dec 26, 2025
RPA vs. AI Automation: Is Robotic Process Automation Being Replaced?

Featured Resources from Cloud Data Insights

Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
The Role of Data Governance in ERP Systems
Sandip Roy
Nov 28, 2025
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.