• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
LLODO – Education and technology

LLODO - Education and technology

Find your international education - university and college study education programs, student Exam, and course information.

  • Technology News
  • Blog Anony
  • Technology Quiz

From being overlooked to one of the biggest cybersecurity threats of an enterprise

01/12/2022 by admin Leave a Comment

API (Application Programming Interface) – from a tool used for the sole purpose of connecting applications, Internet services, IoT, … has now developed into one of the important components to operate. Internet system and is also one of the network security risks that businesses can face.

Akamai Technologies believes that API attacks are often overlooked in terms of magnitude and frequency, but with the development of APIs, they can become one of the biggest threats to businesses. According to the State of the Internet report on API attacks conducted by Akamai Technologies from January 1, 2020 to June 6, 2021, the number of API-related attacks tends to increase gradually, especially when Akamai’s system recorded up to 113.8 million attacks/day. This number is three times higher than the same period in 2020.

API attack: From being overlooked to one of the big cybersecurity risks of enterprises - Photo 1.

According to Gartner’s forecast: “In 2022, attacks on APIs will shift from the occasional vector to the frequent attack vector, leading to data leakage of web applications.”

Security Issues for APIs

API was developed with the main features of integrating and accessing data, in recent years, API has been widely used in digital business and service industries. However, this flexibility becomes an easy place for unexpected problems. And if only using conventional security solutions, it will be nearly impossible for businesses to ensure API security.

API vulnerabilities are similar to common web application vulnerabilities. The reason for this problem is that these applications have been intentionally left with security holes. According to this report, 48% of businesses know but still bring to market applications containing vulnerable code, 54% of these admit that the release of applications containing vulnerable code is due to application of vulnerable code. time force and user needs. Applications with these known vulnerabilities are still available, and will be updated with patches thereafter.

Some other reasons are because enterprises think that these vulnerabilities do not contain too much risk, or were discovered too late and did not have time to fix the errors before being deployed.

And what is the best way for API security?

Akamai Technologies points out 5 points that organizations and businesses need to pay attention to when using APIs. Consists of:

Learn and track APIs in use: Many organizations may have experienced API-related issues that they didn’t even know existed. Therefore, knowing where and how they are used is essential.

Check and understand existing threats with API: Of course, this requires tools and teams to help find vulnerabilities, but if organizations and businesses are not proactive in detecting them, being attacked it will be sooner or later.

Leverage all security tools throughout the entire development, launch, and besides, always ensure that API security reviews are performed regularly.

Don’t use a single setting for each API, prefer a series of settings for reusable APIs.

And finally, API development – at some level – requires the involvement of many different departments, such as development teams, security and network operations teams, identity teams, risk management teams. , security architect and legal team.

Application security, whether API or web application development, is a complex issue that requires businesses to strike a balance between features, applications, and business needs. Recognizing risks and promptly deploying security measures is a solution for businesses to ensure information security in cyberspace. As a world leader in website, application and API firewalls, Akamai Technologies solutions ensure the security of information from the outside and from within the enterprise at the same time.

Through the distribution network of Viettel IDC partner, Akamai Technologies’ security solutions have now reached many domestic enterprises. Smart security solutions from network service providers in the US are highly appreciated by customers because of their high compatibility with Vietnam’s technology infrastructure, the system is quickly deployed in a few clicks and updated. automatically new version. In addition, customers’ websites, applications and APIs are still capable of working well even under attack thanks to the powerful Akamai Intelligent Edge Platform system…

.

Filed Under: Technology News Tagged With: Technological iced tea

Related posts:

  1. Humans can go extinct
  2. Learn to make standard games (game design) at RMIT University
  3. Employees are monitored by machines to the point that they have to pee in bottles, just resting their hands will ring the alarm because Jeff Bezos believes that “everyone is lazy”
  4. CEO Satya Nadella, who ‘reconstructed’ Microsoft
  5. Market capitalization evaporated 400 billion USD, talent left, difficulties surrounded but the CEO only loved tweeting and arguing back and forth
  6. 10 years from engineer to CEO Twitter
  7. Who has ‘killed’ Onkyo, a famous Japanese audio equipment manufacturer?
  8. The journey from a startup born in a Harvard dorm room to a ‘billionaire giant’ is facing the danger of running out of time
  9. Is Elon Musk the modern embodiment of car king Henry Ford?
  10. Mark Zuckerberg is engrossed in the virtual universe, a series of talented people leave
  11. After 2 years of unimaginable expansion, are Big Tech dying and ‘out of time’?
  12. Having launched the world’s first folding screen smartphone, the Chinese tech unicorn struggled to ‘call for help’
  13. Bad times are coming for startups
  14. Elon Musk has gotten out of control, even the US Securities and Exchange Commission is afraid?
  15. Not the chicken problem
  16. VOD/Video on Demand – A solution to help businesses conquer customers with video
  17. Revealing the address of providing cheap office moving services in Ho Chi Minh City
  18. From the guy who sold start-up books with $5,000 to his ambition to IPO in the US
  19. From 20 motorbike taxi drivers to Indonesia’s 10 billion dollar startup
  20. The main purpose of Vinfast’s IPO story is not to raise 1-2 billion dollars, but it is a marketing story, affirming its position in the international market.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google launches new website for kids learning to read
  • Street Fighter 6 is bringing the ‘80s (and feet) back
  • Google TV will reportedly get wearable integration next year
  • Samsung Galaxy Unpacked: all the news and updates from the event
  • Crypto lender Hodlnaut follows other firms in freezing withdrawals




Categories

  • Blog Anony (409)
  • Family and Friends 1 (63)
  • Family and Friends 2 (80)
  • Family and Friends 3 (80)
  • Family and Friends 4 (84)
  • Family and Friends 5 (82)
  • Grade 1 Math (61)
  • Grade 2 Math (96)
  • Grade 3 English (68)
  • Grade 3 Math (67)
  • Grade 4 English (68)
  • Grade 4 Math (77)
  • Grade 5 English (68)
  • Grade 5 Math (88)
  • Grade 6 English (104)
  • Grade 6 Math (67)
  • Grade 6 Physics (30)
  • Grade 7 English (104)
  • Grade 7 Math (57)
  • Grade 7 Physics (30)
  • Grade 8 Biology (64)
  • Grade 8 Chemistry (43)
  • Grade 8 English (104)
  • Grade 8 Math (75)
  • Grade 8 Physics (29)
  • Grade 9 Biology (63)
  • Grade 9 Chemistry (56)
  • Grade 9 English (104)
  • Grade 9 Math (61)
  • Grade 9 Physics (62)
  • Houseware (126)
  • Learning English (50)
  • Linux Quiz (300)
  • Software (31)
  • Technology News (7,793)
  • Technology Quiz (850)
  • Windows Quiz (200)

Copyright (c) 2022 · LLODO.COM - About Us - Privacy Policy - Contact Us - Site map
Link: Question Answer English - Hoc edu - Internet Do