Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsLogical Security

Four testing priorities for stronger API security

By Frank Catucci
computer controls

Image via Unsplash

June 2, 2023

Application programming interfaces (APIs) are the modern currency of today’s advanced enterprise IT systems. They drive countless innovations and streamline services across banking, healthcare and many other sectors. However, this explosion in API use comes with side effects in the form of security gaps — many of which remain hidden as APIs work largely out of view in most application environments. 

Look no further than the recent case at T-Mobile, where hackers exploited a single API to steal the data of 37 million customers. This followed an incident at Twitter where an unsecured API exposed the data of over 5 million customers. Let’s examine the root causes of this API security challenge, and how the right approach to security scanning can clarify and mitigate these risks in both development and production environments. 

APIs are ubiquitous and vulnerable

The API is the behind-the-scenes workhorse that powers content delivery networks, data back-ends and other core elements of modern web application environments. Unfortunately, along with the benefits can come major vulnerabilities that are largely hidden. Because many APIs only exist as an endpoint on a server, they can create security gaps that are not obvious to testers yet easy for malicious actors to exploit.  

For a modern digital enterprise, this combined ubiquity, vulnerability and obscurity of APIs creates a perfect storm when it comes to application security. Even though APIs are embedded in the web application ecosystem via common tools, languages and technologies, they remain difficult to document and maintain, often evading basic security scans.

Basic security blunders such as storing API access keys directly in the code of web and mobile applications can contribute to an even greater security risk. Combined, all these factors paint a sobering picture of API security in need of a more thorough and proactive approach to security scanning.  

Four priorities for effective API scanning

Security professionals must up their game on vulnerability scanning to manage modern API risks. And while each organization will need to tailor its own scanning approach to the nature of the API security threat in the operation, the most successful efforts draw from a common playbook built on these four priorities: 

Obtain API definitions to know what to test

Vulnerability scanners crawl websites and applications to follow links to build up a list of URLs for testing, but security leaders can’t crawl an API in the same way. They can import API definition files in industry-standard formats like Postman, OpenAPI/Swagger, WADL and WSDL. Maintaining the definition files and keeping them updated allows security teams to configure and automate testing for inclusion of APIs as part of the scanning operation.

Integrate API testing into the development lifecycle

Integrating vulnerability testing into the development pipeline makes it far easier to include APIs in security testing workflows. When this happens, developers can ensure that every vulnerability scan covers the entire existing attack surface at every stage where security testing is integrated, including once an application is in production. 

Ensure consistent accuracy across the entire application

Conduct the same security checks for API-based testing and conventional testing by running the same high-quality tests both on interactive pages and on API endpoints. This eliminates weak spots in security posture. The caveat here is to strike the right balance between being thorough and bringing on alert fatigue; this balance can be struck with the help of automatic and accurate vulnerability confirmation functionality to weed out false positives. 

Enforce authenticated scanning

Since all APIs require some kind of authentication, support for authenticated scanning is an absolute necessity to allow the scanner to access API endpoints for testing. Authenticated vulnerability scanning provides maximum test coverage and the most realistic picture of the organization’s real-life security posture across all web-facing assets, including websites, applications, web services and APIs.

API security gaps are often missed by traditional vulnerability scans and remain hidden even from API developers who might not understand the risks involved and where to look for them. API security’s moment in the spotlight may be just beginning, and organizations must continue to take a more advanced approach to security scanning — one that can clarify API security risks, and do so proactively to identify and mitigate them in both development and production cycles. 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: API security application security network security security screening vulnerability management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Frank Catucci is CTO and Head of Security Research at Invicti Security. 


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Cloud computing graphic

    Less than 50% of companies have API security testing tools in place

    See More
  • USA network of light

    What are the DoD's top four priorities in the next year?

    See More
  • online-retail-freepik1170.jpg

    5 tips for a stronger cybersecurity posture for retailers

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • October 16, 2025

    Stronger Together: Elevating Security Through Strategic Partnerships

    ON DEMAND: In the complex and rapidly evolving threat landscape of today, no campus stands secure in isolation. Discover how strategic partnerships can transform fragmented efforts into unified security strategies that protect people, assets, and the institutional mission.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing