Register for 09/13 webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Register for 09/13 webinar: NIST CSF 2.0, API Security, and CISO Imperatives
WEBINAR

August 8, 2022

Q2 API Vulnerability Report: Are APIs Really A Threat?

Earlier this year, Gartner wrote that “by 2022, API abuses will move from an infrequent to the most frequent attack vector, resulting in data breaches for enterprise web applications." [1] Midway through the year, is this being proved true by the facts on the ground? Is the threat real?

To address this, Wallarm continually collects and analyzes published API vulnerabilities and exploits. We dissect the data to look for trends and insights from a variety of perspectives, including software type, vendor, CVSS scores, CWEs and both OWASP Top-10 (2021) for web apps and OWASP API Security Top-10 (2019). We also look at publicly disclosed exploit POCs to determine where the risk lies.

In the 2nd of an ongoing series of webinars, Ivan Novikov, CEO & co-founder of Wallarm and noted security researcher, will reveal the latest API Exploits data and the implications to both organizational risk and your cyberdefenses.

In this webinar you will learn:

  • How big is the problem, and how does it impact your security efforts?
  • How can you assess risk, and prioritize your fixes?
  • How real is the threat, and where should you focus?
Thanks for the download. 
Thank you for registering for our webinar, you will receive a confirmation email shortly. We look forward to seeing you soon!
Thanks for filling out the form!
The webinar link will open in the new tab. If its not, please follow
this link

Our Speakers

Ivan Novikov
CEO at Wallarm

Our Speakers

Ivan Novikov
CEO at Wallarm

Trusted by the world’s most innovative companies:

15 min

To unboard and view secutity results
“I needed cloud security tooling that could get me visibility fast. Wallarm answers all my visibility needs within minutes — across multiple clouds.”
Miro Logo

500K

per year in const savings
“With Wallarm, we've been able to scale API protection to the scale we need and manage with our infrastructure as a code approach.”
Rappi Logo

100%

visibility into multi-cloud environments
“With Wallarm, we've been able to scale API protection to the scale we need and manage with our infrastructure as a code approach.”
Dropbox Logo
Panasonic Logo
Victoria's Secret Logo
Miro Logo
Gannet Logo
Dropbox Logo
Rappi Logo
Wargaming Logo
Semrush Logo
Tipalti Logo
UZ Leuven Logo