Insights / Infographic / API Security From Development to Runtime
January 9, 2025

API Security From Development to Runtime

Emily Marsh
Associate Research Director

John Grady
Principal Analyst, Network Security & Web Application Security

Melinda Marks
Practice Director, Cybersecurity

Market Topics

Cybersecurity Networking

Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

To learn more about these trends, download the free infographic, API Security From Development to Runtime.

Unparalleled insights from analysts with an "insider" perspective

From strategy and product development to competitive insights and content creation, we deliver high-quality, actionable support services.