Data Breaches: How APIs have Become the Top Attack Vector for Data Loss

As the majority of sensitive data now flows through API’s in organizations, data leakage needs to be prevented by monitoring behavioral anomalies anchored around sensitive data sets.

We cover how building baselines of sensitive data usage by the standard user population vis a vis suspicious users, API call flow, inter API time intervals, and device fingerprinting, etc., can help prevent sensitive data exfiltration via APIs.

See examples of how a range of API Abuse patterns have been detected using this approach.