T-Mobile Breach Highlights Common Corporate Security Weakness
Many companies don’t properly secure APIs, the ubiquitous interface that lets technology programs communicate
Health-ISAC mention:
“API security is an area that’s largely been overlooked,” said Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center, a nonprofit group that enables healthcare organizations to share information about cyber threats. “The main challenge is getting cybersecurity teams to realize how vulnerable their APIs are,” he said.
Jan. 23, 2023 5:30 am ET | WSJ PRO
The data breach of about 37 million T-Mobile US Inc. customers occurred through an attack on an API, or application programming interface, highlighting a risk facing many businesses.
APIs connect applications and share information in many settings, like mobile applications that connect to a social media platform, cars that drivers can unlock via an app, or backroom technology that moves data across different information systems.
Companies rely on APIs as they expand technology projects, often without proper security measures, cybersecurity analysts and researchers say.
Read the full article in the Wall Street Journal:
- Related Resources & News
- Health-ISAC Hacking Healthcare 10-15-2024
- Health-ISAC Welcomes Booz Allen Hamilton to the Ambassador Program
- Health-ISAC Hacking Healthcare 10-9-2024
- Monthly Newsletter – October 2024
- Health ISAC leads effort to transform SBOM information sharing under CISA-facilitated community work
- CyberEdBoard Insights: Phil Englert and Errol Weiss
- Health-ISAC Hacking Healthcare 9-10-2024
- Strengthening Healthcare Cybersecurity: Lessons from Recent Supplier Attacks
- Specialize in Securing Critical Infrastructure
- How AI is transforming cybersecurity, on defense and offense