Heading

Heading

Heading

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

March 12, 2025
August 4, 2025

APIs, Sharks, and Blood in the Water: Why API Security Can’t Be Ignored

Think your APIs are safe because they’re out of sight? Think again. In this gripping talk from APISEC|CON, Chris St. Amand compares modern API security risks to the hidden terror of Jaws—what you can’t see can absolutely hurt you. With 84% of companies suffering an API-specific incident last year, this isn’t just a warning—it’s a wake-up call. Learn why visibility is everything, why automation is your lifeline, and how to start securing your APIs before there’s blood in the water.

APIs, Sharks, and Blood in the Water: Why API Security Can’t Be Ignored

If Jaws taught us anything, it’s that what we don’t see can hurt us—just like APIs lurking beneath the surface until attackers strike. Chris St. Amand’s 2025 APISEC|CON presentation drew an unforgettable parallel: APIs are sharks in deep water, and ignoring them means waiting for blood in the water.

Key Findings That Should Wake You Up

  • APIs are exploding in scope
    Gartner estimated the API management market at $70M in 2013, ballooning to $660M by 2020—and up to $16B projected in 2029. That’s a tidal wave of attack surface.
  • API incidents are skyrocketing
    The API Security Impact Study (2024) reports that 84% of organizations suffered an API-specific security incident in the past year, up from 78% in 2023.
  • Visibility is abysmally low
    In 2023 only 40% said they had a full inventory of APIs exposing sensitive data. That dropped further to just 27% in 2024, creating a hacker’s paradise.

Why Are So Many Companies Still Getting Hacked Through APIs?

1. Obscurity is the Enemy

APIs often remain hidden—documentation is sparse, inventory is incomplete, and stakeholders don’t even know what they’re trying to protect. Chris stressed that devs must raise awareness internally: “there’s a shark in the water.”

2. Third‑Party Risk

Chris highlighted vulnerabilities stemming from third-party integrations—from B2B platforms to IoT vendor APIs. Blind trust in vendor security is a minefield.

3. Scale and Automation Challenges

Organizations run hundreds of APIs, and attackers now use automation and AI tools previously reserved for testing. Manual efforts simply can’t keep pace.

What You Can Do: Chris’s Tactical “Bigger Boat” Strategy

You need a bigger boat—meaning automation, awareness, and layered defenses.

Obscurity: Know What You Protect

  • Build full API inventories and map what data each endpoint exposes.
  • Demand security transparency from vendors and partners.

Automation: Fight Fire with a Bigger Boat

  • Automate API scanning and security checks in your CI/CD pipeline.
  • Use API gateways to monitor and analyze all API traffic in one place.

The Basics: Harden Your APIs

  1. TLS everywhere
  2. Strong authentication + authorization—don’t let endpoints allow actions that UIs block.
  3. Expose minimal data—no over-fetching or excessive fields.
  4. Token obfuscation—mask IDs and other sensitive identifiers.

API Gateway & Monitoring Tools

Gateways can enforce security policies—rate limiting, authentication, logging, threat detection—all in one central layer.

DevOps Integration

  • Scan API schemas and headers automatically.
  • Run continuous tests for auth, BOLA, resource quotas.
  • Let manual penetration testing focus on high-priority logic flaws.

Stay Updated with OWASP API Security Top 10

Chris recommended using the OWASP API Top 10 as a baseline defense toolkit—including BOLA, broken auth, business logic abuse, and improper inventory management.

Cross‑Links: Expand Your Knowledge at APIsec University

What Should AppSec and DevSecOps Teams Do to Secure APIs?

Focus AreaActions to TakeAwarenessInventory APIs, document endpoints, highlight risks internally.AutomationIntegrate API scanners and auth checks into CI/CD; continuous monitoring.Hardening BasicsEnforce TLS, strong auth/authz, limit sensitive data exposure.Governance & TrainingTrain devs and security staff, vet third-party API use.Security StandardsUse OWASP API Top 10 as baseline; decommission unused versions.

Frequently Asked Questions

What is the biggest threat to API security today?
Unauthorized access through exposed or undocumented endpoints—especially when there’s no visibility.

How can I secure APIs without slowing down development?
Use automated tools in your CI/CD pipeline to enforce authentication, validate input, and scan for common vulnerabilities.

Do I need both manual and automated API testing?
Yes. Automation gives you breadth; manual testing gives you depth—especially for business logic flaws.

What’s the first step to improving API security?
Build a complete inventory of your APIs and identify which ones expose sensitive data.

Final Thoughts

Chris St. Amand’s talk is a powerful call to action—not to wait for “blood in the water,” but to prepare proactively. With 84% of companies hit last year and only 27% fully aware of their API inventory, the risk is real. Yet with layered defenses, automation, secure governance, and strong team alignment, we can stay ahead of the shark.

Want help building that bigger boat? Explore the free API Security Fundamentals course and DevSecOps-specific training—then shift your strategy from reactive to proactive. The water’s full of sharks: get your crew ready.

Latest Articles

Earn your APIsec University Certificate

  • Earn an APIsec University certificate and badge for completing any of our courses.

  • Post your badge on LinkedIn and share your accomplishments. You can even receive CPE credits for taking these courses.