Akamai Technologies (NasdaqGS:AKAM) released new research highlighting significant security gaps as organizations accelerate API deployment without sufficient safeguards. The API Security Impact ...
Akamai (NASDAQ: AKAM) today released new research showing that organizations are rushing to deploy APIs without adequate security or testing, leaving them vulnerable to attacks once released. Now in ...
Akamai (NASDAQ: AKAM) has been named a Customers’ Choice in the 2026 Gartner Peer Insights “Voice of the Customer” for API Protection. Akamai earned a 93% recommendation rate and was the only vendor ...
A survey by Akamai raises issues around API security and equates the issue with the rise of agentic AIs placing demand on API ...
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
In the intricate landscape of modern business, application programming interfaces (APIs) are vital linchpins that seamlessly integrate systems, applications and users. These digital conduits are ...
Cequence Unveils Industry’s First and Only API Security Testing Suite for Generative AI Applications
LAS VEGAS--(BUSINESS WIRE)--Cequence, a pioneer in API security and bot management, is proud to introduce revolutionary advancements to its Unified API Protection (UAP) platform at Black Hat USA.
Salt Security today announced the launch of new enhancements to the Salt Security API Protection Platform that enhance API discovery, posture governance, and threat protection across organizations.
The proliferation of artificial intelligence tools to reshape enterprise operations has created a parallel security challenge: The surge in application programming interface traffic driven by AI ...
API security often involves third-party, rather than first-party, APIs, and each use case can have different requirements. Rather than trying to make one technological approach work for all instances, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results