Helping organizations understand and enforce API security posture at scale, Akamai (NASDAQ: AKAM) today introduced Security Posture Center and enhanced APIs-from-code capabilities. Together, these ...
Cybersecurity company Snyk Ltd. today announced the launch of Snyk API & Web, a new dynamic application security testing or DAST solution designed to meet the growing demands of modern and ...
A survey by Akamai raises issues around API security and equates the issue with the rise of agentic AIs placing demand on API ...
Akamai (NASDAQ: AKAM) has been named a Customers’ Choice in the 2026 Gartner Peer Insights “Voice of the Customer” for API Protection. Akamai earned a 93% recommendation rate and was the only vendor ...
APIs power the modern enterprise as an essential component of digital modernization, mobile and web applications and AI-powered tools. Bridging critical yet seamless connections between customers and ...
Top API security tools can help hold the line against modern threats to the important and ubiquitous software development interfaces. Application programming interfaces (APIs) have become a critical ...
57% of organizations reported at least one data breach caused by API exploitation in the past two years. Despite these breaches, organizations are still testing only 38% of their APIs for ...
With Neosec acquisition, Akamai gains capabilities around API visibility, a security challenge for organizations, many of which have hundreds of integrated applications. Akamai Technologies announced ...
When organizations consider application programming interface (API) security, they typically focus on securing APIs that are written in-house. However, not all the APIs that companies use are ...
A growing reliance on APIs has fueled security concerns, with nearly all organizations (99%) reporting API-related security issues in the past year. According to the Q1 2025 State of API Security ...
Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data. A recent ...