Q1. Noname Security announced some major enhancements to its API security platform in March 2023. What are some of these enhancements and how do they build on the platform's existing capabilities?
In today's digital age, APIs have become an essential component of many organizations' business strategies. APIs provide a way to access and share data, streamline processes, and enable innovation. However, with the increased use of APIs comes the heightened risk of cyberattacks, making API security a top priority for businesses.
The Noname API Security Platform offers a comprehensive approach to API security, providing end-to-end protection against both known and unknown threats. The platform employs advanced technologies like artificial intelligence and machine learning to identify and prevent attacks before they can cause damage. Noname Security's platform continuously monitors API traffic, detects anomalies, and takes action to prevent attacks in real time.
In March, we unveiled a new release of the platform to enhance visibility into users’ API environment and protect against the growing number of API-based threats.
The latest offerings deliver new capabilities across the entire platform – covering discovery, posture management, runtime protection, pre-production testing, and deployment – to help customers:
- Locate and provide insight into every API in an organization’s ecosystem
- Detects and blocks API attacks with real-time traffic analysis
- Deliver secure APIs faster with active testing
- Continuously adapt to changing environments
We made these enhancements to ensure our platform remains the most advanced API security solution on the market, catering to complex deployment and regulatory requirements, and providing support for the broadest set of ecosystem integrations ensuring compatibility with your current and future environments.
Q2. As APIs become increasingly interconnected across various systems and platforms, what emerging security challenges should organizations anticipate? What should they be doing now, to address the challenges?
After reviewing the notable breaches from last year, it doesn’t take long to realize that vulnerable APIs were the most preferred attack vector for hackers.
APIs are the common thread that connects all devices and microservices; gaining access to the pipeline that carries sought-after information can prove profitable. In today’s drive toward digital transformation, the popularity and use of APIs increase, as does the cyber-risk landscape associated with it.
Our new digital age of hyperconnectivity means that everyday items like your vehicle are also smart devices, which also means that exploited API vulnerabilities could expose your vehicle's location or enable hackers to compromise your vehicle's remote management system. In the event your remote management was actually breached, cybercriminals would have the ability to unlock your vehicle, start the engine or even disable the starter altogether.
There are currently two things happening that make securing APIs difficult. First, the number of APIs being created, maintained, and used in these environments is growing exponentially. Second, the traffic and volume of information these APIs are transacting is through the roof.
Add to the equation microservices and connections between devices, and the potential for vulnerabilities is quite high. For an attacker, exploiting these APIs can be relatively easy once they find a vulnerability.
The bottom line: APIs are and will continue to be a lucrative attack vector for hackers to exploit as long as organizations continue to ignore them.
Organizations need to invest in technologies and solutions that proactively address API misconfigurations and vulnerabilities, and provide intelligent analysis of the information that’s being transacted in order to respond to the speed and growth of information at scale. Automation is critical for closing the gap between what a security team can handle on its own, and the ever-expanding API attack surface that exists today.
Q3. What are Noname Security's plans at Black Hat USA 2023? What is your organization's main messaging focus at the event?
Today, most APIs are not security tested before they are pushed to production. Quality assurance (QA) processes review apps and APIs for functionality, and some APIs are run through security testing tools, but the limits of these tools means that most APIs are overlooked. This leaves APIs vulnerable, despite handling organizations’ most important data, including personally identifiable information (PII), personal health information (PHI), or financial data such as payment card industry (PCI) data.
Forward-thinking organizations have embraced “shift left” and “DevSecOps” methodologies to incorporate security earlier in the development lifecycle. However, traditional testing tools and approaches were not designed to test the security of APIs, leaving organizations exposed.
Current challenges include:
- Traditional testing approaches such as SCA, SAST, and DAST don’t understand the complex business logic that makes APIs work, but also makes them vulnerable. Many testing solutions only use fuzzing, which brute-forces testing mainly for functionality and only the most basic vulnerabilities.
- Furthermore, many if not most APIs are not even identified by SAST/DAST tools and not actually tested. This is what security experts call “reachability”: the ability to successfully consume an API for testing, including both functionally (e.g. “HTTP 200 OK” status) and a logical response (e.g. the body of the response includes expected values).
- SAST especially requires specific calibration to the programming languages used, requires significant expertise to set up, offers only limited coverage of business logic, and can take days to deliver results.
To combat these challenges, Noname Security will be announcing new product offerings to help industry leaders to further “shift left,” leave no API untested, and stop vulnerabilities from reaching production.