Cloud SecurityHIGH

API Security - Strategies for CISOs Amidst New Threats

Featured image for API Security - Strategies for CISOs Amidst New Threats
CSCSO Online
API securityCISOBECUFortitude ReSalt Security
🎯

Basically, APIs are now a major target for cyberattacks, and companies need to secure them.

Quick Summary

APIs are becoming the new target for cyberattacks, prompting CISOs to rethink security strategies. With many organizations vulnerable, understanding API security is crucial. Effective governance and visibility are key to mitigating risks.

What Happened

Recent breaches indicate a significant shift in cyber threats, moving from traditional endpoints to application programming interfaces (APIs). This change is largely due to the growing use of APIs in modern software architectures. Sean Murphy, CISO at BECU, emphasizes that APIs have become the new perimeter of security. With many organizations relying on microservices, the number of APIs can range from hundreds to thousands, creating a larger attack surface for cybercriminals.

A 2025 report from Salt Security revealed that nearly one in three organizations experienced an API breach in the past year. These breaches often stem from misconfigured APIs, which attackers exploit using stolen credentials. Traditional security measures, such as endpoint detection and response (EDR) and web application firewalls (WAFs), frequently fail to detect these types of attacks, as they lack the necessary context to identify business-logic abuse.

Who's Being Targeted

Cybercriminals are increasingly targeting APIs because they connect critical systems and sensitive data. High-profile incidents, like the 2024 Optus breach, exposed millions of records due to broken API access controls. APIs are now viewed as a primary attack surface by many CISOs, as they often allow attackers to bypass traditional security measures. This trend is further exacerbated by the rise of agentic AI, which interacts with APIs, making them even more appealing to attackers.

Organizations that fail to maintain a proper inventory of their APIs are particularly vulnerable. A study found that 70% of enterprises only document 30% of their APIs, leaving many unmonitored and exposed. This lack of visibility can lead to significant security gaps, as developers may inadvertently create exploitable paths without realizing it.

Tactics & Techniques

The tactics employed in API attacks often involve exploiting business logic rather than traditional payload patterns. Attackers can use stolen tokens or credentials to perform legitimate-looking requests that manipulate API behavior. For instance, they might abuse long-lived tokens for financial APIs, blending their actions into normal traffic until damage occurs.

CISOs are recognizing that legacy defenses are insufficient against these new threats. Traditional security tools primarily focus on IP-based attack vectors and do not account for the complexities of API interactions. As a result, many organizations are adopting new strategies to enhance their API security, including governance frameworks and identity-aware security measures.

Defensive Measures

To combat API threats, CISOs are implementing comprehensive strategies that go beyond merely acquiring new tools. Organizations like BECU have established API governance structures that enforce policies across development teams. This proactive approach helps reduce misconfigurations, which are a leading risk in API security.

CISOs recommend cataloging all APIs, ensuring visibility into their usage, and applying strong identity and access controls. By treating APIs as critical infrastructure, organizations can better protect their digital assets. This includes practices such as limiting scopes, rotating credentials, and continuously reassessing trust levels. As the landscape of API security evolves, organizations must prioritize these measures to stay ahead of potential threats.

🔒 Pro insight: As APIs evolve, organizations must adopt adaptive security measures that incorporate contextual awareness to defend against sophisticated API-layer attacks.

Original article from

CSCSO Online
Read Full Article

Related Pings

MEDIUMCloud Security

World Backup Day 2026 - Key Takeaways for Organizations

This World Backup Day, organizations are urged to rethink their backup strategies. Testing and securing recovery plans are crucial against data loss. Don't let a data breach disrupt your operations; be prepared!

IT Security Guru·
MEDIUMCloud Security

Data Security Posture Management - Top DSPM Tools Explained

Data Security Posture Management tools are essential for identifying and protecting sensitive data in the cloud. Organizations must understand these tools to minimize risks and enhance security. Stay informed about the best DSPM solutions available today.

CSO Online·
HIGHCloud Security

Cloud Security - Key Insights from CloudSecList Issue 331

CloudSecList Issue 331 reveals critical cloud security updates, including a supply chain attack by TeamPCP and vulnerabilities in Google Cloud. Organizations must stay vigilant to protect their data.

CloudSecList·
HIGHCloud Security

Cloud Security Alert - European Commission Cyberattack Confirmed

The European Commission confirmed a cyberattack after its AWS account was compromised. While data was exfiltrated, core systems remained secure. Immediate containment measures were enacted to protect sensitive information.

Cyber Security News·
HIGHCloud Security

Cloud Cyberattack - European Commission Confirms Incident

A cyberattack has hit the European Commission's cloud systems, affecting data but sparing internal networks. The Commission is investigating the breach while enhancing security measures. This incident highlights the ongoing threats facing critical institutions.

Security Affairs·
MEDIUMCloud Security

Cloud Security - Microsoft’s Certified Software Designation Explained

Wiz has achieved a certified software designation from Microsoft for Azure. This recognition enhances cloud security for Azure customers, ensuring they can innovate securely. It's a significant step for organizations looking to strengthen their cloud strategies.

Wiz Blog·