article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Cyber assaults – from data theft to credential stuffing to account take over — today often start with legitimately accessing a client-facing application and then manipulating an API to extract valuable data, launch a DoS attack, or perform an account takeover. A startling 95% of API attacks happen on authenticated endpoints.

Big data 240
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Lightspeed’s enterprise sectors beyond cybersecurity include big data, SaaS, crypto, and IT services. In 1999, four investment professionals founded Lightspeed Ventures to serve entrepreneurs in enterprise and consumer markets. Redpoint Ventures. Sequoia Capital.