Akamai (NASDAQ: AKAM) today released new research showing that organizations are rushing to deploy APIs without adequate security or testing, leaving them vulnerable to attacks once released. Now in ...
Akamai (NASDAQ: AKAM) has been named a Customers’ Choice in the 2026 Gartner Peer Insights “Voice of the Customer” for API Protection. Akamai earned a 93% recommendation rate and was the only vendor ...
A survey by Akamai raises issues around API security and equates the issue with the rise of agentic AIs placing demand on API ...
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
Cequence Unveils Industry’s First and Only API Security Testing Suite for Generative AI Applications
LAS VEGAS--(BUSINESS WIRE)--Cequence, a pioneer in API security and bot management, is proud to introduce revolutionary advancements to its Unified API Protection (UAP) platform at Black Hat USA.
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...
Salt Security today announced the launch of new enhancements to the Salt Security API Protection Platform that enhance API discovery, posture governance, and threat protection across organizations.
In the intricate landscape of modern business, application programming interfaces (APIs) are vital linchpins that seamlessly integrate systems, applications and users. These digital conduits are ...
TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it. Every AI interaction triggers a chain of API calls across your environment. Many of those APIs aren’t documented or tracked.
The proliferation of artificial intelligence tools to reshape enterprise operations has created a parallel security challenge: The surge in application programming interface traffic driven by AI ...
API security often involves third-party, rather than first-party, APIs, and each use case can have different requirements. Rather than trying to make one technological approach work for all instances, ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results