When organizations consider application programming interface (API) security, they typically focus on securing APIs that are written in-house. However, not all the APIs that companies use are developed internally, rather some are designed and developed by other organizations. The problem is that many companies don’t realize that using third-party APIs can expose their applications to security issues, such as malware, data breaches, and unauthorized access.
Third-party APIs are software interfaces that allow organizations to leverage third-party functionality or data on their own websites or applications. These third-party APIs enable developers to integrate their applications or systems with external services, data, or functionality, says Phil Quitugua, director of cybersecurity at technology research and advisory firm ISG.
More Stories
Reimagining Democracy
Imagine that all of us—all of society—have landed on some alien planet and need to form a government: clean slate....
China-based SMS Phishing Triad Pivots to Banks
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple...
Google Cloud: China Achieves “Cyber Superpower” Status
Google Cloud’s Sandra Joyce said that Chinese state actors’ advanced techniques and ability to stay undetected pose huge challenges Read...
Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity
Google Cloud announced a number of security products designed to reduce complexity for security leaders Read More
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024
The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight...
SpyNote Malware Targets Android Users with Fake Google Play Pages
A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan Read More