After Theranos, the risk from ‘black box’ start-up API security providers is a real threat - Photo by Marc Mueller from PexelsEnterprises need reliable and complete solutions, not heavily marketed vapourware. One of the hottest trends in cybersecurity is API security, and for a good reason. Security organisations have realised APIs are everywhere: on all of their cloud environments and in their data centres. APIs communicate with customer interfaces, such as web and mobile apps.

APIs also communicate with suppliers and business partners with server-to-server communication. Used for automation and administration – we can reasonably say any code written in the last three years is either using or exposing an API.

This explosion of APIs comes with many challenges for the average security organisation. More often than not, APIs are being developed rapidly, and mistakes are very common. Those mistakes can be design flaws, misconfigurations, and vulnerabilities such as inappropriate authorisation.

It would be nearly impossible to find an organisation aware of all the APIs in its environment. This is especially true for those not routed through the centric gateway. There is also the issue of the data that goes through any of the APIs or who is permitted to access the API or the data behind it.

How does that relate to Theranos?

In case you aren’t familiar, Theranos was a “breakthrough” technology company that claimed to have devised blood tests that required only very small amounts of blood. It could be performed very rapidly using small, automated devices the company had developed. The only problem? The device didn’t work properly and produced inaccurate results. It turns out the tiny sample of blood was ineffective, too.

In a very similar fashion, API security solutions are boasting their “breakthrough” AI models. They claim businesses will never have to worry about APIs again. The problem is, just like Theranos, those companies are relying on a very narrow window into your environment. They only have limited visibility into API traffic without a contextual understanding of the API itself.

In the absence of sufficient details and insights, API vulnerabilities can go unnoticed, and attacks can resemble legitimate behaviour. A few drops of “blood” from an API traffic capture is not enough to build an accurate AI model for API security.

Noname Security recognises that the API security problem is complex and requires a unique approach and architecture.

Therefore, we created a platform that, though sophisticated, is simple to use. It is also non-disruptive because it does not require changes to the network or architecture at the customers’ end. We provide value by solving the real issue of API Security.

But, how?

Poor API security solutions make empty promises. They bombard customers with buzzwords and obfuscate what’s really important. You can’t build an adequate API security operational model without sufficient visibility, context, and integrations. Here’s what’s crucial to know:

  • Shadow, or Rogue APIs, are APIs you are not aware of. Often these are APIs that are not routed through a managed gateway. If your API security relies only on APIs routed through a gateway, it could result in serious security gaps that can leave these APIs exposed and vulnerable. Look for a solution that has multiple sources for API data. This includes gateway integrations and network analysis. It will help build a more accurate inventory of your APIs, including those you didn’t know you had.
  • API specification analysis can help with fortifying API security. Standards such as OpenAPI Specification (OAS) can streamline API design and collaboration. They can also be used to help generate code and ensure quality. Modern API security solutions can help you compare the written specification (OAS) against the actual observed traffic. Differences can be identified so that feedback can be provided back to the developers to remediate. This will help ensure the API is only used for its intended purposes and nothing more.
  • It’s possible to detect attacks in real-time, address misconfigurations, and identify security defects for remediation. The challenge is doing it at scale and with operational efficiency. API security solutions need to integrate and complement existing technologies such as WAFs and workflow tools. When attacks, anomalies, or misconfigurations are detected, the solutions should be capable of initiating the response. This could include automated (or semi-automated) signalling to the WAF to reset a session, revoking a credential at the gateway, or opening a JIRA change request to resolve a misconfiguration. The API security platform should leverage the investment in your existing technology stack, not add more complexity.

It’s noisy in the marketplace. You can feel spoiled for choice as you browse the shiny new software tools that could be the exact thing you’re looking for. But be wary — they could also be the wrong items, distorted by the vapourware fog.


NonameNoname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and Secure API SDLC. Noname Security is privately held, remote first with headquarters in Palo Alto, California, and an office in Tel Aviv and Amsterdam.

LEAVE A REPLY

Please enter your comment!
Please enter your name here