Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecurityCybersecurity News

It’s time to adopt modern API security

By Tom Hickman
API security
June 8, 2022

Web applications — and the Application Programming Interfaces (APIs) that enable businesses to connect their apps with partners and users — are a top prize for cyberattackers.

As the building block of today’s web applications, APIs have become the attack vector of choice due to their ubiquity and lack of understanding on how to best secure them. This is part of a worrying trend. A recent study from Gartner states that by 2025, less than 50% of enterprise APIs will be managed. This startling prediction is based on the fact that APIs have become a victim of their own success, and their growth is overtaking security teams’ abilities to manage them.

Making matters worse is that today’s threat environment is wildly complex. Attackers understand that a security team’s priority is to stop them — and they plan accordingly. Unfortunately, security teams armed with more traditional approaches are often unprepared for this reality. It is past time that security leaders look toward a new approach to secure APIs.

New cyberattack patterns require modern solutions

Attackers unleash armies of bots, morph IP addresses and create complex scenarios that make it nearly impossible to rely on the legacy approach — identifying signatures of known threats — to defend web applications and APIs.

There are currently two primary options for legacy threat detection solutions: “threat intelligence” and rules. Threat intelligence is typically nothing more than the ability to import known IPs, user agents, or other static characteristics about known bad actors. It is important to note, however, that not all threats fit neatly into these categories.

Rules are primarily pattern recognition elements that evaluate a single request and “match” it against a known list of malicious identifiers. While this approach will identify the unsophisticated attackers, mature and more modern attackers know these techniques all too well and are constantly evolving their cyberattack patterns to avoid detection. Because of this, security teams that attempt a rules-based approach face constant tuning while they play catch-up, which is both ineffective and time consuming.

Risk of rules in today’s threat landscape

Rules were feasible approaches when threats were immature and predictable, but those days are long gone. Consider these points:

  • A rule requires someone to have conclusively identified a pattern in the attack that can be described in a static rule.
  • New attacks are discovered all the time, meaning security teams must constantly create and apply new rules; this is a significant resource burden.
  • Rules-driven security for web apps and APIs assumes the ability to clearly identify and label a threat as such.

What does this all mean for security programs centered on rules? As more and more rules are created, the strategy becomes more and more tenuous. Rules become quickly outdated and clutter the comprehension of how the solution is configured. And, in what may create greater business risk, rules often begin matching against normal application or user behaviors, forcing security teams to balance attack detection vs. blocking legitimate traffic. In 2022, with much commerce being “online first,” blocking legitimate traffic can be a death knell for some organizations, including small businesses. But, there is a better choice.

Using attacker behavior to defend web application & API security

Attackers rarely, if ever, follow a linear path in efforts to breach an adversary. Threats are multi-pronged, change over time and can shift patterns. Attacks may begin slowly and ebb over time before reappearing after a month or more. Attackers are also skilled in creating evasion techniques that make it extremely hard for a rule to serve as an effective line of defense. For instance, some threat actors understand security teams’ thresholds and deftly navigate a network without setting the alarm bells off.

To defend in today’s threat environment, companies must accept this reality. And, in this context, understanding the motivations and intent of the threat is key to defending web applications and APIs. Security teams must be able to identify the traits and behaviors of an attacker to identify, track and defend against today’s sophisticated security threats.

It is imperative that organizations identify key behavioral elements of an attack and respond before any lasting damage is done. Using attacker behavior to inform security defenses empowers organizations to effectively guard web applications and APIs, and puts attackers on their heels, forcing them to scramble and evolve their attack patterns to evade detection.

Organizations should look to further understand the threats they face through analytics. Continuously monitoring all users as they interact with an application or API while looking for key indicators of suspicious behavior is an important step in this process. Even better, work to track risk over time and across multiple applications.

This combination allows security teams to track suspicious and malicious users across multiple IPs as they use various evasion techniques and modify the attack parameters. The key to this approach is shifting from “pattern matching” against a single request to truly monitoring each user and their behaviors to increase efficacy without blocking legitimate traffic.

By tracking and analyzing the behavior of attackers over time, organizations can gain a much more complete and precise view of risk — both immediately and borne through low and slow attacks over time. This level of behavioral insight gives security teams the most complete defense against web app and API attackers. This insight puts security teams back in the driver's seat of their organizational security in a more proactive posture while leaving the legacy rulebook where it belongs: in the past.
KEYWORDS: API security application security behavioral analytics cyber attack cyber security threat threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tom hickman

Tom Hickman is the Chief Innovation Officer at ThreatX.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • White arrow on blue wall

    Why It’s Time to Shift to Preemptive Exposure Management

    See More
  • person playing chess in suit

    Tone at the top: It’s time to bring security to the board level

    See More
  • gold computer chip

    It's time to prepare for quantum computing’s impact on DNS security

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • November 19, 2025

    From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

    ON DEMAND: When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing