Skip to main content
VendorsSalt Security

Salt Security

Cybersecurity reports and statistics published by Salt Security

8 categories3 reports

Recent Statistics & Reports

Nearly 80% of organizations increased their API security budgets in the past year.

10/8/2025
APIBudget

39% of organizations adhere to the NIST Cybersecurity Framework for API development and deployment.

10/8/2025
APINIST

50% of security leaders have slowed a new application rollout due to API security concerns.

10/8/2025
APIAPI security

23% of organizations plan to adopt GenAI within the next 6–12 months for API development.

10/8/2025
APIGenAI

45% of respondents cited the potential for new API vulnerabilities tied to AI-generated code.

10/8/2025
APIAI

47% of respondents cited difficulty understanding and securing AI-generated code.

10/8/2025
APIAI

56% of respondents cited a lack of control over AI model security used for code generation.

10/8/2025
APIAI

2% of respondents expressed other security concerns about using Generative AI to develop APIs.

10/8/2025
APIGenAI

35% of respondents cited difficulty ensuring quality and reliability of AI-generated code.

10/8/2025
APIAI

15% of organizations are very confident in detecting and responding to attacks leveraging Generative AI.

10/8/2025
APIGenAI

55% of organizations were somewhat confident in their ability to detect and respond to attacks leveraging Generative AI.

10/8/2025
APIGenAI

5% of organizations did not know about their ability to detect and respond to attacks leveraging Generative AI.

10/8/2025
APIGenAI

9% of organizations were unsure about their API security budget increase.

10/8/2025
APIBudget

2% of respondents identified 'Other' as their biggest concern about their company’s overall API program.

10/8/2025
API

15% of organizations were not very confident in their ability to detect and respond to attacks leveraging Generative AI.

10/8/2025
APIGenAI

80% of security leaders lack continuous, real-time API monitoring.

10/8/2025
APIAPI monitoring

96% of attack attempts originate from authenticated entities (compromised users, insiders, or rogue agents).

10/8/2025
API

98% of attack attempts target external-facing APIs.

10/8/2025
API

10% of dominant attack vectors map to OWASP API1 Broken Object Level Authorization (BOLA).

10/8/2025
APIOWASP

78% of dominant attack vectors map to OWASP API8 Security Misconfiguration.

10/8/2025
APIOWASP

Showing first 20 results