This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Many large enterprises now rely on hundreds of third-party SaaS applications to do business, but their security organizations can barely keep pace. Right now, the state of the art for SaaS enterprise security are cloud access security brokers (CASBs) that act as intermediaries between users and the actual service.
RedHat today announced that it’s acquiring container security startup StackRox. StackRox’s acquisition is part of some consolidation we have been seeing in the Kubernetes space in general and the security space more specifically. Another competitor, Aqua Security, which has raised $130 million, remains independent.
Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. It is highly likely that these investments have led to greater operational security (OPSEC) and specialization in China-linked intrusion operations, the researchers noted.
Last week, Microsoft’s Windows 7, once the go-to operating system of nearly 60 percent of all computers , reached the company’s designated end of the road for security patches. Like Windows XP before in 2014 , if you have a Windows 7 computer, it’s long past time for you to shell out some cash for a new one.
Dropbox announced today that it plans to acquire DocSend for $165 million The company helps customers share and track documents by sending a secure link instead of an attachment. It’s worth noting that Box offers a similar secure document sharing capability enabling users to share a link instead of using an attachment.
SecurityScorecard has been helping companies understand the security risk of its vendors since 2014 by providing each one with a letter grade based on a number of dimensions. The company changed that by starting a system of scoring the security posture of different companies and giving them a letter grade of A-F just like at school.
From Blasé to Bad Ass I was recently turned on to a TED talk that legendary skateboarder Rodney Mullen gave back in 2014. Rodney shares more insights on his comparison: “They connect disparate information, and they bring it together in a way that a security analyst doesn't expect. It’s pretty rad.
Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. It is highly likely that these investments have led to greater operational security (OPSEC) and specialization in China-linked intrusion operations, the researchers noted.
The raise highlights investors’ continued confidence in cybersecurity businesses to net returns, despite the current macroeconomic woes. While there’s some evidence that fundraising has begun to slow down, cybersecurity startups raised $2.4 ThreatX was co-founded in 2014 by Bret Settle and Andrius Useckas.
T&E expense firm Certify found in a 2014 analysis that businesses lost $30,000 each because of expense fraud reports, like mischaracterized expenses, fictitious expenses, overstated expenses and multiple reimbursements. .” Itilite also features built-in fraud prevention tools that leverage AI to spot submission errors.
Jscrambler , a Portugal-based startup specializing in cybersecurity products that protect organizations against web data exfiltration attacks, has secured $15 million in Series A funding. The investment, which comes two years after the startup secured $2.3 health privacy rules HIPAA.
14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.
Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.
Founded in 2014, the company operates its business across Singapore, Malaysia, Indonesia, Thailand, Vietnam, and the Philippines. This round comes after its $279 million Series D round at about $750 million of valuation in May 2020. Ninja Van claims it delivers approximately 2 million parcels a day, with more than 1.5
Government has issued guidance in the form of a framework from the National Institute of Standards and Technology (NIST), called the NIST Cybersecurity Framework. What Is the NIST Cybersecurity Framework? It was originally targeted at improving cybersecurity for critical infrastructure sectors in the United States. Version 1.0
Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec. How to secure your home Wi-Fi. ”—Joshua Meyer, analyst, Independent Security Evaluators. READ MORE ON ROUTERS AND THE INTERNET OF THINGS.
In a previous article , we talked about the need for organizations to secure data wherever it resides. The scope of this problem is serious enough that it has gotten the attention of the US government’s Department of Commerce, which released new guidelines for addressing cybersecurity supply chain risk in May 2022. . The bottom line?
The list below is an update to our reference of "Cyber Security Wake-Up Calls." For now, resolve yourself to this observable fact: Our history indicates cyber security events frequently cause action and remediation and get widespread attention. What does it take to be on the list? Here is an updated list of major events.
The process that led to this discovery, publicly revealed on Tuesday, began in July 2014 , when a pseudonymous source sent SiliVaccine 4.0 READ MORE ON SECURITY AND GEOPOLITICS. to the journalist Martyn Williams , who specializes in reporting on North Korean technology. China evaluates vulnerabilities for attacks before disclosure.
Since Satya Nadella took the helm in 2014, Microsoft has doubled down on its support for non-Microsoft technologies. Partnerships are especially important in the cybersecurity realm, as Microsoft’s core strengths in its own technologies reinforce long-standing “Microsoft shop” silos.
Biotech/healthcare and cybersecurity dominated the run of big rounds this week, with a few AI startups also seeing good-sized checks. Huntress , $150M, cybersecurity: Maryland-based Huntress became the newest cybersecurity unicorn after it raised a $150 million Series D at a $1.5 billion-plus valuation. million deaths annually.
—Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements. But even locking down a long-criticized Android privacy flaw won’t help the operating system beat its biggest security flaw: its own success. READ MORE ON ANDROID SECURITY.
The action culminated today with Google s announcement of a planned $32 billion acquisition of cloud security unicorn Wiz. The next-closest deal, per Crunchbase data, was Meta s 2014 acquisition of WhatsApp for $19 billion. If consummated, Googles purchase would represent the largest acquisition of a private, venture-backed U.S.
While Google has big business muscle behind it, Kevala has been working in this space since 2014 and is potentially poised to become an industry leader. . Automotive startup Upstream raises $62M Series C to scale cloud-based security. The startup also hopes to increase its cybersecurity services to help protect grid infrastructure.
The startup launched its first product, Bridgit Field, in March 2014. Strategic workforce planning was a recurring theme, in addition to the need to forecast future staffing demands and “collaborative” access to people and project data, according to Brodie. In 2019, it brought its second product, Bridgit Bench, to market.
The Austin-based firm recently secured $145 million in its own debt and equity financing to help B2B SaaS founders grow their businesses without diluting ownership. million post-money valuation in 2014. “I Enter Founderpath. How Founderpath differs from others in the increasingly crowded space lies in its terms, Latka believes.
UPDATED with a revised list of secure messaging apps. A few months ago, my parents asked a great security question: How could they securely send their passport numbers to a travel agent? When sending between Gmail accounts or within a company, he adds, secure transport “probably isn’t an issue.” Here’s how to tell.
As companies scramble to find qualified IT talent, they are struggling to achieve greater female representation in their technology ranks, particularly in key areas such as software engineering and cybersecurity. There’s a stereotype of what security looks like, but the technical stuff is the easiest to pick up,” Lee says.
In Zimbabwe, for instance, only 30% of the adult population had access to any financial services as of 2014. Verification is done on-chain through Algorand, which bills itself as a solution to the blockchain trilemma of security, scalability and decentralization. Several years ago the numbers were starker. million in 2016.
Baillie Gifford led the equity financing, which brings Honor’s total equity raised to $325 million since its 2014 inception. And today, San Francisco-based Honor has announced that it has raised $70 million in Series E funding and $300 million in debt financing, bringing its valuation to over $1.25
The round comes just four months after the company secured a $100 million Series C round at a $1 billion valuation. Chainalysis was founded in 2014 as the official investigators into the hack of Mt. Paradigm led the latest funding event while existing backers Addition and Ribbit doubled down on their investment in the company.
FullStory , which sells analytics tools for apps and websites, secured $25 million in new equity financing, paperwork filed with the U.S. Securities and Exchange Commission this week shows. TechCrunch couldn’t independently confirm the investors and the company hadn’t responded to a request for comment as of press time.
It’s been a while since we checked in on BigPanda — nearly eight years to be exact, and much has changed since the company came out of stealth in 2014. The company’s technology transforms huge volumes of IT data into actionable insight and automates incident management so IT operations teams can be proactive about their response processes.
This is perhaps why Product School says it has secured $25 million in growth equity investment from growth fund Leeds Illuminate (subject to regulatory approval) to accelerate its product and partnerships with client companies. And the edtech space hasn’t traditionally catered to this sector.
Founded in 2014 to provide last-mile deliveries for small merchants, the company has since expanded to serve large e-commerce platforms, too. SiCepat , an end-to-end logistics startup in Indonesia, announced today it has raised a $170 million Series B funding round. million packages per day in 2020.
The online website creation and hosting service is a venture-backed entity, having raised Series A and B rounds in 2010 and 2014, respectively. today announced that it has confidentially submitted a draft registration statement on Form S-1 with the Securities and Exchange Commission (the “SEC”).
Earlier this year, global identity security provider Ping Identity formed an alliance with Deloitte to meet the Australian enterprise’s growing demand for Zero Trust identity security. Ping Identity CEO and founder to provide keynote. Agenda | Register ) If you are not a customer or a partner, please use “ PINGYOUAPAC “.
The company designs and manufactures so-called hardware wallets to secure crypto assets. Ledger’s main products are hardware crypto wallets that offer a high level of security. Hardware wallets are secure by design because the private key of the crypto wallet never leaves the device — it is stored in a certified secure chip.
Samuels joined Venrock in 2014 after 12 years at healthcare-centric firm Versant Ventures. Get your pass to attend with the rest of the TechCrunch community for less than $100 if you secure your seat before next month. Some recent bets include Unity Biotechnology, Iris Medicine and Biolux.
Securities and Exchange Commission this week. The company, which has raised over $455 million since it launched in 2014, was most recently valued at just over $4.5 Confluent became the latest company to announce its intent to take the IPO route, officially filing its S-1 paperwork with the U.S. What does Confluent do?
As the global agricultural industry stretches to meet expected population growth and food demand, and food security becomes more of a pressing issue with global warming, a startup out of South Africa is using artificial intelligence to help farmers manage their farms, trees and fruits. million, according to Aerobotics.
The challenge is, as new APIs and protocols emerge, some aren’t supported by existing API management and security platforms. He’s the co-founder of Gravitee , a startup building a tool for designing, securing, managing and deploying APIs that supports both asynchronous APIs (i.e., At least, that’s how Rory Blundell sees it.
The rapidly growing volume and sophistication of attacks entail the need for greater preparedness, especially through regular security exercises. Here’s a question related to the field of security: Why do military organizations ceaselessly conduct combat exercises or drills? Security validation is necessary for many compelling reasons.
How has the security of the Internet of Things evolved in recent years? Now, for the first time since 2014, OWASP has updated its own Top Ten list of IoT Vulnerabilities. TechBeacon last visited the topic in 2017 and found the picture to be troubling at best.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content