VendorsSalt Security
Salt Security
Cybersecurity reports and statistics published by Salt Security
8 categories3 reports
Research Reports
Reports and publications from Salt Security
Recent Statistics & Reports
Nearly 80% of organizations increased their API security budgets in the past year.
10/8/2025•
APIBudget
39% of organizations adhere to the NIST Cybersecurity Framework for API development and deployment.
10/8/2025•
APINIST
50% of security leaders have slowed a new application rollout due to API security concerns.
10/8/2025•
APIAPI security
23% of organizations plan to adopt GenAI within the next 6–12 months for API development.
10/8/2025•
APIGenAI
45% of respondents cited the potential for new API vulnerabilities tied to AI-generated code.
10/8/2025•
APIAI
47% of respondents cited difficulty understanding and securing AI-generated code.
10/8/2025•
APIAI
56% of respondents cited a lack of control over AI model security used for code generation.
10/8/2025•
APIAI
2% of respondents expressed other security concerns about using Generative AI to develop APIs.
10/8/2025•
APIGenAI
35% of respondents cited difficulty ensuring quality and reliability of AI-generated code.
10/8/2025•
APIAI
15% of organizations are very confident in detecting and responding to attacks leveraging Generative AI.
10/8/2025•
APIGenAI
55% of organizations were somewhat confident in their ability to detect and respond to attacks leveraging Generative AI.
10/8/2025•
APIGenAI
5% of organizations did not know about their ability to detect and respond to attacks leveraging Generative AI.
10/8/2025•
APIGenAI
9% of organizations were unsure about their API security budget increase.
10/8/2025•
APIBudget
2% of respondents identified 'Other' as their biggest concern about their company’s overall API program.
10/8/2025•
API
15% of organizations were not very confident in their ability to detect and respond to attacks leveraging Generative AI.
10/8/2025•
APIGenAI
80% of security leaders lack continuous, real-time API monitoring.
10/8/2025•
APIAPI monitoring
96% of attack attempts originate from authenticated entities (compromised users, insiders, or rogue agents).
10/8/2025•
API
98% of attack attempts target external-facing APIs.
10/8/2025•
API
10% of dominant attack vectors map to OWASP API1 Broken Object Level Authorization (BOLA).
10/8/2025•
APIOWASP
78% of dominant attack vectors map to OWASP API8 Security Misconfiguration.
10/8/2025•
APIOWASP
Showing first 20 results