article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. Yet, in bringing us here, APIs have also spawned a vast new tier of security holes. Meanwhile, the best security tooling money can was never designed to deal with this phenomenon. Dearth of planning.

Big data 240
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Wiz Cloud security 2020 Private Evervault Developer encryption 2019 Private Verkada Security surveillance 2019 Private Armis IoT network security 2015 Private Sumo Logic Threat intelligence 2014 Nasdaq: SUMO Okta Identity management 2013 Nasdaq: OKTA Barracuda Enterprise security 2006 Private.