Web application programming interfaces (APIs) are the glue that holds together cloud applications and infrastructure, but these endpoints are increasingly under attack, with half of companies ...
The shift to AI-native design drastically expands the enterprise API attack surface. Large Language Models (LLMs) and autonomous agents operate via complex, API-chained workflows. This reality of AI ...
This marks the third straight year of increased incursions and marks an all-time high (up from 78% in 2023). Akamai Technologies, Inc. today announced new research showing that while API attacks are ...
OX Security today announced a new integration with Tenable, the exposure management company, designed to eliminate fragmented visibility across cloud and application environments and help ...
MAHWAH, N.J., Jan. 20, 2026 (GLOBE NEWSWIRE) -- Radware (RDWR) ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the launch ...
Cloud systems are an emergent standard in business, but migration efforts and other directional shifts have introduced vulnerabilities. Where some attack patterns are mitigated, cloud platforms leave ...
Mimecast, a global leader in managing human and AI risk, today announced that its complete email security protection stack is now available through API deployment, eliminating a fundamental trade-off ...
MCLEAN, Va.--(BUSINESS WIRE)--FireTail Inc., a disruptor in API security, today published The State of API Security 2024 report, a comprehensive analysis of the API security landscape and how this ...
Content delivery network and cloud services provider Akamai Technologies Inc. today announced a new native connector between Akamai API Security and the Akamai Connected Cloud that simplifies the ...
CAMBRIDGE, Mass., April 19, 2023 -- Akamai Technologies, Inc., the cloud company that powers and protects life online, today announces that it has entered into a definitive agreement to acquire Neosec ...
Enterprise security isn’t easy. Small oversights around systems and vulnerabilities can result in data breaches that impact millions of users. Unfortunately, one of the most common oversights is in ...
Understanding the landscape of interactions, behaviors, and potential threat vectors is the next frontier of API security. However, four in 10 companies still can’t discover all of the APIs they’re ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results