Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Inon Shkedy - API security risks

By Maria Henriquez
5mw Shkedy
June 18, 2021

A recent report by Salt Security shows that 91% of organizations suffered an API-related problem in the last year, and more than half (54%) reported finding vulnerabilities in their APIs, 46% pointed to authentication issues, and 20% described problems caused by bots and data scraping tools.

Here, Inon Shkedy, Head of Security Research for Traceable, who also serves as the API Security Project Lead at OWASP and co-authored the OWASP API Top 10, talks to Security magazine about API security risks.

 

Security: What is your background? What are your current responsibilities in your role?

Shkedy: My background is in security research, but more specifically I have done extensive work in identifying and analyzing APIs and their security risks. Currently, I am the Head of Security Research at Traceable. 

For the past two and a half years, I have also served as the API Security Project Leader at the OWASP (The Open Web Application Security Project) Foundation. At OWASP, we aim to improve software security through open source and community education. I lead the analysis and compilation of the top 10 API security risks for OWAS.

 

Security: What is API security?

Shkedy: API security sounds simple - keeping the applications and microservices that businesses rely on safe from cybercriminals and without vulnerabilities. But it is much more complicated than that in practice. Especially in the past year as traditionally brick and mortar businesses flocked to virtual environments, the sheer number of APIs in operation vastly increased - often to the point where it is difficult for a business to truly know and have visibility into every API that interacts with their organization.

API security starts with a clear view and understanding of every API communicating to or accessing an enterprise’s applications and data. From there, it’s understanding the DNA of every API - who are the users, what groups do they belong to, which are risky and more likely to be exploited (for example: unauthenticated APIs). Another critical aspect of API security is understanding user behavior and identifying anomalous behavior in order to catch bad actors before they cause any harm. 

 

Security: Why should enterprise security teams be concerned with APIs?

Shkedy: APIs have become the backbone of the modern internet infrastructure and increased the speed of software development simply because of the sheer number of industries and companies that have digitally transformed operations. 

But as more companies move to the cloud and adopt microservices, these applications, the APIs and the data associated with them are increasingly vulnerable if not protected properly. APIs are relatively new as an infrastructure and can interact with a variety of users and applications, making them hard to keep track of. And because they are so important to corporate infrastructure and access significant amounts of data, they are the perfect target.

 

Security: What are some of the most common vulnerabilities in API security? What do these vulnerabilities reveal about the security landscape? 

Shkedy: There are many vulnerabilities associated with APIs, but some of the most common include broken authorization, whether for objects, or functions; excessive data exposure, through generic implementations or relying on the client to filter out sensitive information; security misconfigurations, usage of vulnerable 3rd party libraries, and more; and mass assignment, which occurs when provided data is bound to data models without proper filtering. 

Most of the API breaches that happened in the last few years are related to authentication and authorization problems. The process of validating that a user is accessing only information he is supposed to access becomes very challenging in modern applications, as a result of complex user hierarchies and policies.

 

Security: What are some of the best ways to mitigate these vulnerabilities?

Shkedy: There are three best practices that are absolutely critical to keep APIs secure. It is important to have an API inventory and make sure you know where your APIs are. This includes APIs that belong to older versions and different environments. On top of that, it’s important to have proper documentation that can tell you which endpoints each API host exposes, which endpoints are public (don’t require authentication) and which ones can be accessed from the internet.

Organizations also need to encourage developers to use secure coding practices - most API vulnerabilities start within the code. Make sure your developers are aware of best practices for secure coding in the production phase. Lastly, businesses should review their authorization policies and mechanisms - authorization is a very sensitive mechanism, and I would recommend letting only the most experienced engineer make changes in it.

 

KEYWORDS: API security cyber security data breach enterprise security OWASP risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Security guard

Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Kohler

    5 minutes with Paul Kohler – Security concerns with contact tracing apps

    See More
  • Alan Duric

    5 minutes with Alan Duric – Security, privacy and more

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • High-Rise Security and Fire Life Safety, 3rd edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing