Why APIs will be the No. 1 Enterprise Attack Vector in 2022

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Application programming interfaces (APIs) are increasingly enabling business innovation. A rapid increase in mobile applications, containers, serverless computing, microservices architectures and cloud adoption has led to an explosion in API usage, with many enterprises deploying hundreds or even thousands of APIs.

However, many organizations’ API security strategies are still maturing: adequate security controls have yet to be developed, vulnerable code is knowingly pushed into production and organisations are not fully aware of what is in their API estate and the exposure to risk this may represent.

With Gartner now stating APIs will be the number one attack vector for cloud applications in 2022, decision-makers responsible for protecting APIs may now need to review their security strategies. 

Join us as we explore

  • Why APIs are now the attacker’s favorite tool
  • What are the common mistakes organizations are making
  • Understanding if you need to act now by defining the scope of your attack surface and the risks this may imply.
  • What should a best practice API strategy look like


Photo of Farrukh Ahmad

Farrukh Ahmad

Cloud and Cybersecurity Expert, PA Consulting

Photo of Benjamin David

Benjamin David

Deputy Editor, Infosecurity Magazine

Photo of James Sherlow

James Sherlow

Sr. Field Solutions Engineer EMEA, Cequence Security

Photo of Colin Tankard

Colin Tankard

Managing Director, Digital Pathways

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Cequence Security here: https://www.cequence.ai/privacy/. Please see Infosecurity Magazine’s privacy policy for more information.