• About
  • Subscribe
  • Contact
Thursday, April 2, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home FutureCISO Process Cybersecurity operations

AI-first push in APAC reveals widening API security gap

by FutureCISO Editors
April 2, 2026
AI-first push in APAC reveals widening API security gap

Photo by Jan van der Wolf: https://www.pexels.com/photo/markings-on-the-platform-in-close-up-photography-11197221/

Share on FacebookShare on Twitter

Rapid adoption of AI across the Asia‑Pacific region has intensified pressure on API security, creating a widening gap between innovation velocity and defensive maturity, according to Akamai’s 2026 Apps, APIs and DDoS State of the Internet report. The vendor’s APAC insights warn that APIs — the connective tissue of many AI‑driven services — are increasingly the primary attack surface for threat actors.

Akamai observed nearly 65 billion web application and API attacks in APAC during 2025, a 23% increase year‑on‑year. The report also noted triple‑digit global growth in daily API attacks and that 87% of surveyed organisations worldwide experienced an API‑related security incident in 2025.

Layer 7 distributed denial‑of‑service (DDoS) attacks rose 104% globally over two years; these attacks target application‑level processes that handle user requests and can directly disrupt APIs and the services they underlie.

The character of attacks is shifting from simple exploitation to business logic abuse. In APAC, 61% of API attacks in 2025 involved unauthorised workflows or abnormal activity, the report states, describing tactics such as automated transactions, scraping, or repeated legitimate calls that exhaust resources or consume costly AI tokens.

Akamai also observed AI‑powered bots increasingly mimicking legitimate traffic to evade conventional defences.

Sectors that depend heavily on APIs remain prominent targets. Retail and financial services were singled out for exposure because of digital payments and cross‑border services; telecommunications and high‑technology firms also reported rising pressure as they scale API‑driven offerings.

Akamai’s analysis highlights divergent regional risk profiles. In highly digitised markets such as Singapore and Japan, large API portfolios create visibility challenges and a sprawling attack surface. In emerging digital economies including Vietnam and Thailand, swift digitisation is outpacing local security capabilities and talent, increasing susceptibility to attacks.

Related:  Holiday havoc: Surge in cyber threats threatens festive season joy

The report also flagged risks introduced by AI‑assisted low‑code development. Faster delivery of code can carry misconfigurations or insecure API defaults into production without adequate review, compounding visibility and governance problems.

“Across APAC, AI adoption is accelerating business transformation at an unprecedented pace. However, this speed has also caused a rapidly increasing governance gap, forcing organisations to rethink their overall risk landscape,” said Reuben Koh, director of security technology and strategy, APJ at Akamai.

Reuben Koh

“Organisations must prioritise building stronger operational governance to allow innovation to continue at speed. They also need clearer visibility of their APIs, have to manage AI bots and agents, require real‑time monitoring across the stack, and need to build security into applications from code to runtime.” Reuben Koh

The report concludes that as autonomous AI systems become more embedded in operations, resilience at the API layer will be decisive for firms seeking to scale safely, with failure likely to bring operational disruption, financial loss and reputational damage.

Tags: AkamaiAPI securitycyber attacksDDoS

FutureCISO Editors

No Result
View All Result

Recent Posts

  • AI-first push in APAC reveals widening API security gap
  • Enterprises rush into GenAI without security foundations
  • The blind spots enabling modern ransomware
  • Only 9% of organisations meet verified trust criteria as AI increases identity risk
  • Commvault adds real‑time governance for structured and AI data

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl