Skip to main content
HomeTopicsSecurity

Security

We've curated 32 cybersecurity statistics about Security to help you understand how proactive measures, emerging technologies, and best practices are shaping the way organizations defend against cyber threats in 2025.

Showing 21-32 of 32 results

18.9% of API-related exploits involved legacy APIs, including AJAX backends and URL parameter-based systems.

Wallarm1/1/2025
APILegacy Systems

Only 11% of AI-powered APIs implemented robust security measures, such as bearer tokens with expiration times.

Wallarm1/1/2025
AIAPI

Less than half of the respondents (44.1% of CISOs) described the relationship between compliance and security as completely synchronized.

RegScale1/1/2025
Compliance

Almost one in ten (9.6% of CISOs) said their relationship between compliance and security is in a period of complex negotiations while 8.5% said their relationship is out of sync.

RegScale1/1/2025
Compliance

Over 50% of exploits in CISA’s Known Exploited Vulnerabilities (KEV) report were API-related in 2024, up from 20% in 2023.

Wallarm1/1/2025
APIVulnerability

API-related data breaches tripled in 2024.

Wallarm1/1/2025
APIData Breach

Of the organisations that measure the operational cost of managing compliance, more than three quarters (75.4%) track all costs.

RegScale1/1/2025
ComplianceNegotiations

Of the organisations that measure the operational cost of managing compliance, 14.5% track compliance expenses.

RegScale1/1/2025
ComplianceNegotiations

Almost all (94.2% of CISOs) believe that continuous controls monitoring will improve both compliance and security.

RegScale1/1/2025
ComplianceContinuous Controls

57% of AI-powered APIs were externally accessible.

Wallarm1/1/2025
AIAPI

89% of AI-powered APIs relied on insecure authentication mechanisms, like static keys.

Wallarm1/1/2025
AIAPI

98.9% of AI vulnerabilities are API related.

Wallarm1/1/2025
AIVulnerability