drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Fall 2026 Call for Presentations
    • DRJ Fall 2026
    • DRJ Scholarship
    • Tracey Rice Memorial Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • DRJ Glossary of Business Continuity Terms
    • Careers
    • The BCI Partnership
  • ABOUT
    • About DRJ
    • 2026 Media Kit
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee

Salt Security Research: As AI Agents Outpace Security, Most Organizations Face an Unsecured API Surge

by Jon Seals | April 8, 2026 | | 0 comments

The latest State of AI and API Security Report Finds Almost Half of Organizations Have Delayed AI Deployments Due to API Security Concerns; and Nearly All Attacks Now Originate from Authenticated Sources

PALO ALTO, Calif. – Salt Security, the leading API and agentic security company, today released its 1H 2026 State of AI and API Security: Navigating the Agentic Era report, revealing a widening gap between the rapid deployment of AI agents and the security programs designed to protect them. The research finds that while autonomous AI agents are being deployed at enterprise scale, 92% of organizations lack the advanced security maturity required to defend these environments.

In order to work properly and carry out autonomous actions, AI is reliant on APIs, which are becoming the execution layer for AI systems, powering every action taken by agents, large language models (LLMs), and Model Context Protocol (MCP) servers. Because of this, the number of APIs in use in organizations today have exploded, with two-thirds (66%) reporting growth of over 50% in the last year.

However, as organizations scale AI-driven automation, security is failing to keep pace, creating what Salt defines as the Agentic Security Gap. The security of modern AI environments now requires visibility and control across the entire agentic stack, not just individual APIs.

“You cannot secure AI agents without securing every layer they touch, including the APIs they call, the MCP servers they route through, and the data they access,” said Roey Eliyahu, Co-Founder and CEO at Salt Security. “Risk in the agentic era doesn’t sit in one place. It lives in how all of those pieces interact in real time.”

AI Adoption is Accelerating and Security is Falling Behind

The research, based on a survey of 327 security leaders, shows that while AI adoption is accelerating, security maturity is lagging:

  • Almost half (47%) of organizations have delayed production releases due to API security concerns
  • Almost one third (32%) experienced an API security incident in the past year
  • Only 8% report advanced API security maturity, leaving most organizations underprepared
  • Two-thirds (66%) reported API growth of more than 50% in the past year, driven by automation and AI adoption

Additionally, 79% of boards and executive teams have increased scrutiny of AI security risks, yet only 18% are extremely confident in their ability to detect attacks leveraging Generative AI, a confidence gap that reflects the inadequacy of legacy tools in agentic environments.

A notable reason for this confidence gap, is lack of visibility, which remains a critical weakness:

  • Less than one in four (24%) have a fully automated API inventory, while the majority rely on partial or manual tracking
  • Nearly 90% of organizations are already using or planning to use GenAI in API development, introducing new security risks into the software lifecycle

The findings also point to a marked change in the threat landscape where attackers are no longer breaking in, they are operating inside trusted systems, often through AI-driven processes.

  • Nearly all (99%) of attack attempts analyzed by Salt Labs originate from authenticated sources, increasingly rogue agents operating with legitimate credentials but no human oversight, no rate limiting, and no behavioral guardrails.
  • Almost two-thirds (65%) of attacks exploit Security Misconfiguration (OWASP API8), a vulnerability dramatically amplified when over-permissioned APIs are connected to AI agents that can query, chain, and exfiltrate data at machine speed.

API Security Emerges as the Fourth Pillar of Cybersecurity

The report concludes that API security is no longer a subset of application or cloud security, but a foundational discipline in its own right. As APIs now account for the majority of web traffic and power all AI agent activity, they represent a distinct and critical attack surface that existing security pillars were not designed to protect.

To address this shift, Salt Security is advancing a new model for enterprise security called the Agentic Security Graph, which maps the relationships between:

  • LLMs (reasoning layer)
  • MCP servers (execution layer)
  • APIs (action layer)

Together, these components form the agentic stack, providing the context needed to understand not just what AI systems generate but also what they do across enterprise environments.

“Salt Security was founded on the belief that APIs are the most critical and most overlooked attack surface in the enterprise. As AI agents have emerged, it has become clear that APIs are just one pillar in a much larger, deeply connected system,” said Roey Eliyahu, Co-Founder and CEO at Salt Security. “Today, we secure the entire agentic environment, the llm, agents, MCP servers, APIs, and the data they access. Our 1H 2026 research confirms that this isn’t a future problem, it’s happening now, and most organizations are not ready.”

The 1H 2026 State of AI and API Security: Navigating the Agentic Era is available for download The report is based on a survey of 327 security professionals conducted in early 2026, spanning technology, financial services, healthcare, manufacturing, and other industries.

About Salt Security

Salt Security is the leading API and agentic security company, protecting the world’s most innovative enterprises from API and AI agent attacks. The Salt Security API Protection Platform secures the full agentic ecosystem—discovering all APIs, agents, and MCP connections; stopping attacks in real time; and eliminating vulnerabilities before they reach production. Salt Security was founded in 2016 and is backed by Sequoia Capital, S Capital, Tenaya Capital, Salesforce Ventures, Advent International, and other leading investors. For more information, visit www.saltsecurity.comor follow Salt Security on LinkedIn and X.

Related Content

  1. Ways to Enhance Strategic Influence of Security Professionals Within Organization
  2. Understanding API Security: Insights from GoDaddy's FTC Settlement
    Understanding API Security: Insights from GoDaddy’s FTC Settlement
  3. Disaster Recovery Journal
    Salt Security State of API Security Report Reveals 95% of Respondents Experienced API Security Problems Driven by Accelerated API Usage

Recent Posts

Cork Cyber Tackles the Dirty Data Problem Quietly Undermining MSP Cyber Programs with New Automated Mapping Feature

April 17, 2026

DuploCloud Strengthens Enterprise Trust Position with SOC 2 Type II and ISO/IEC 42001 Milestones

April 16, 2026

Keeper Security Launches Enterprise-Grade Approval Governance and Real-Time Visibility for Endpoint Privilege Management

April 16, 2026

ONEKEY: Vulnerability Management and SBOM Generation Are Key to CRA Compliance

April 16, 2026

Compliance Breakthrough at Dauphin Island leads to CRS Class Improvement

April 15, 2026

Fiverr Data Leak Exposes Sensitive Documents – Expert Commentary

April 15, 2026

Archives

  • April 2026 (38)
  • March 2026 (89)
  • February 2026 (76)
  • January 2026 (61)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2026
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Fall 2026 | Resilience In Motion

    Leave your details below for a chance to win a free pass to DRJ Fall 2026 | Resilience In Motion. The winner will be announced on July 30. Join us for DRJ's 75th Conference!
    Enter Now