Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

5 Minutes With

How organizations can defend against the increasing API attack surface

By Jordyn Alger, Managing Editor
SEC_Web_5Minutes Mattson
October 29, 2024

Application programming interfaces (APIs) are growing in prominence. As APIs increase beyond the range of manual control, organizations may face greater security challenges. 

Here, we talk to Karl Mattson, Director, Security Technology Strategy at Akamai. 

Security magazine: Tell us about your title and background. 

Mattson: With over 25 years of experience in cybersecurity and technology leadership roles, I have had the privilege of leading teams across financial services, retail, and federal government sectors.

In July 2021, I joined Noname Security as CISO, where I helped establish a rigorous standard for operational and API security excellence and advocated for ongoing platform advancements based on our customers’ needs.

Today, I am the Director of Security Technology Strategy at Akamai (NASDAQ: AKAM), the cloud company that powers and protects life online, following Akamai's acquisition of Noname Security in June 2024. In my current role, I am responsible for leading Akamai strategy for its security portfolio, including new partnerships, products and alliances so that Akamai is continuously delivering innovation to our global customers.  

Before joining Noname Security, I was the CISO at PennyMac Loan Services and City National Bank. Additionally, I served as Senior Vice President of IT Risk Management at PNC. 

Security magazine: What are the greatest threats against APIs, and why is there a growing prevalence of API security threats and risks?

Mattson: APIs are everywhere. Any business with a mobile app or modern web apps (SPAs), using the cloud, undergoing digital transformation, integrating with business partners, running microservices, or using Kubernetes all use and operate with APIs.

When it comes to protecting APIs, the primary focus is on safeguarding the data transmitted through APIs. Recent cyber attack trends point to two primary threat drivers.

First, there's data theft, which can be misused and resold for various criminal purposes. This type of data theft can lead to significant financial and reputational damage for organizations. The second threat is ransom, where data stolen via an API is held for ransom with the threat of public exposure to sabotage, leak, or abuse your company’s data or image for financial gain. 

As large language models (LLMs) become more prevalent, their reliance on APIs for embedding and integration with applications will grow. With systems becoming increasingly interconnected, securing the pipelines and APIs that connect software is crucial. The rise in API attacks means organizations using generative AI technologies face similar risks. To sustain trust, the industry must focus on implementing secure APIs and ensuring strong security practices for third-party transactions.

Security magazine: How have today’s modern enterprises come to rely on APIs?

Mattson: APIs serve as a universal connector for nearly all aspects of our digital life — web and mobile applications, B2B commerce, and our public cloud infrastructure behind the scenes. In every industry vertical, API-first digital strategies unlock new digital experiences for customers and employees, business revenue streams, and resource efficiencies. 

Modern enterprises rely on APIs to meet shifting software user demands for more digital experience functionalities. For example, mobile app users want comprehensive information, such as checking the value of their home through their bank app or viewing their credit score along with their credit card details. As long as consumers seek enhanced digital experiences, APIs will remain the most efficient way to deliver these improvements.

Security magazine: How can organizations proactively protect against the increasing API attack surface?

Mattson: To proactively protect against the increasing API attack surface, organizations need to implement a comprehensive security strategy that considers and includes the following:

  • Understanding the business logic and application workflows thoroughly
  • Conducting thorough threat modeling to identify potential misuse cases
  • Implementing robust API security measures and maintaining visibility of all APIs, including shadow APIs
  • Employing advanced security solutions that can detect and prevent business logic abuse using behavioral analytics and AI

APIs are increasingly becoming both the front and back doors for attackers to breach a system, using API vulnerabilities to gain access and API traffic to exfiltrate data. To combat this abuse, organizations need to adopt a holistic security approach that continuously monitors APIs and learns and adapts to evolving API behaviors.

Security magazine: Anything else you would like to add?

Mattson: Today, the API security market is maturing quickly. If the past discussion was about the need for API security, today, the discussion is all about the how as the need is already well established. Data shows that web attacks against applications and APIs surged by 49% between Q1 2023 and Q1 2024, as more than 108 billion API attacks were recorded from January 2023 through June  2024. 

Software code has come under attack in innovative and deeply troubling ways as APIs have become the critical pipeline in modern organizations. Because of this, we can expect to continue to see API hacking as a major threat vector. These attacks have altered the security landscape for both developers and their organizations, not to mention their suppliers, partners, and customers.

KEYWORDS: 5 minutes with API security application security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes with Chokshi

    Pay Attention to the Intersection of API Security and AI Proliferation

    See More
  • Colorful laptop

    Security leaders discuss botnet attack against Microsoft 365 accounts

    See More
  • Gavel and book

    Cyber Risks Can Be Legal Risks: How to Protect the Organization

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing