Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Inon Shkedy - API security risks

By Maria Henriquez
5mw Shkedy
June 18, 2021

A recent report by Salt Security shows that 91% of organizations suffered an API-related problem in the last year, and more than half (54%) reported finding vulnerabilities in their APIs, 46% pointed to authentication issues, and 20% described problems caused by bots and data scraping tools.

Here, Inon Shkedy, Head of Security Research for Traceable, who also serves as the API Security Project Lead at OWASP and co-authored the OWASP API Top 10, talks to Security magazine about API security risks.

 

Security: What is your background? What are your current responsibilities in your role?

Shkedy: My background is in security research, but more specifically I have done extensive work in identifying and analyzing APIs and their security risks. Currently, I am the Head of Security Research at Traceable. 

For the past two and a half years, I have also served as the API Security Project Leader at the OWASP (The Open Web Application Security Project) Foundation. At OWASP, we aim to improve software security through open source and community education. I lead the analysis and compilation of the top 10 API security risks for OWAS.

 

Security: What is API security?

Shkedy: API security sounds simple - keeping the applications and microservices that businesses rely on safe from cybercriminals and without vulnerabilities. But it is much more complicated than that in practice. Especially in the past year as traditionally brick and mortar businesses flocked to virtual environments, the sheer number of APIs in operation vastly increased - often to the point where it is difficult for a business to truly know and have visibility into every API that interacts with their organization.

API security starts with a clear view and understanding of every API communicating to or accessing an enterprise’s applications and data. From there, it’s understanding the DNA of every API - who are the users, what groups do they belong to, which are risky and more likely to be exploited (for example: unauthenticated APIs). Another critical aspect of API security is understanding user behavior and identifying anomalous behavior in order to catch bad actors before they cause any harm. 

 

Security: Why should enterprise security teams be concerned with APIs?

Shkedy: APIs have become the backbone of the modern internet infrastructure and increased the speed of software development simply because of the sheer number of industries and companies that have digitally transformed operations. 

But as more companies move to the cloud and adopt microservices, these applications, the APIs and the data associated with them are increasingly vulnerable if not protected properly. APIs are relatively new as an infrastructure and can interact with a variety of users and applications, making them hard to keep track of. And because they are so important to corporate infrastructure and access significant amounts of data, they are the perfect target.

 

Security: What are some of the most common vulnerabilities in API security? What do these vulnerabilities reveal about the security landscape? 

Shkedy: There are many vulnerabilities associated with APIs, but some of the most common include broken authorization, whether for objects, or functions; excessive data exposure, through generic implementations or relying on the client to filter out sensitive information; security misconfigurations, usage of vulnerable 3rd party libraries, and more; and mass assignment, which occurs when provided data is bound to data models without proper filtering. 

Most of the API breaches that happened in the last few years are related to authentication and authorization problems. The process of validating that a user is accessing only information he is supposed to access becomes very challenging in modern applications, as a result of complex user hierarchies and policies.

 

Security: What are some of the best ways to mitigate these vulnerabilities?

Shkedy: There are three best practices that are absolutely critical to keep APIs secure. It is important to have an API inventory and make sure you know where your APIs are. This includes APIs that belong to older versions and different environments. On top of that, it’s important to have proper documentation that can tell you which endpoints each API host exposes, which endpoints are public (don’t require authentication) and which ones can be accessed from the internet.

Organizations also need to encourage developers to use secure coding practices - most API vulnerabilities start within the code. Make sure your developers are aware of best practices for secure coding in the production phase. Lastly, businesses should review their authorization policies and mechanisms - authorization is a very sensitive mechanism, and I would recommend letting only the most experienced engineer make changes in it.

 

KEYWORDS: API security cyber security data breach enterprise security OWASP risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Kohler

    5 minutes with Paul Kohler – Security concerns with contact tracing apps

    See More
  • Alan Duric

    5 minutes with Alan Duric – Security, privacy and more

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • High-Rise Security and Fire Life Safety, 3rd edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing