This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Palo Alto Networks has been on buying binge for the last couple of years, and today it added to its haul, announcing a deal to acquire Expanse for $800 million in cash and equity awards. It works by giving the security team a view of how the company’s security profile could look to an attacker trying to gain access.
Few organizations use a single cloud infrastructure vendor, and figuring out how to configure security across multiple clouds can be a challenge for companies. Cisco announced over the weekend that it intends to acquire Valtix , a startup that helps companies secure their environments across multiple clouds. Valtix launched in 2020.
Netskope , focused on Secure Access Service Edge architecture, announced Friday a $300 million investment round on a post-money valuation of $7.5 million round at the end of 2018. We are fortunate to be in that situation, and our destination is to be the most impactful cybersecurity company in the world.
Corelight, a San Francisco-based startup that claims to offer the industry’s first open network detection and response (NDR) platform, has raised $75 million in Series D investment led by Energy Impact Partners. . million Series A in July 2017. million Series A in July 2017.
Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. This breadth of information can be much more valuable on the black market—sometimes up to $30 per record—than the typical consumer financial profile , which sells for $10 to $12.
In fact, it took $200 million or more to make the list last month, as defense tech and cybersecurity led the way. NinjaOne , $500M, cybersecurity: NinjaOne, which provides endpoint management, security and monitoring, raised $500 million in Series C extensions at a $5 billion valuation more than doubling its value from just 12 months ago.
startups raised half a billion dollars apiece, and another eight raised $100 million or more, with industries from cybersecurity to biotech to AI represented. Founded in 2018, the company has raised $1.2 Founded in 2018, the company has raised $654 million, per Crunchbase. billion valuation in the process. billion valuation.
RedHat today announced that it’s acquiring container security startup StackRox. IBM purchased the company in 2018 for a hefty $34 billion and has been leveraging that acquisition as part of a shift to a hybrid cloud strategy under CEO Arvind Krishna. for a platform that secures containers in Kubernetes.
Deepak Jain, CEO of a Maryland-based IT services firm, has been indicted for fraud and making false statements after allegedly falsifying a Tier 4 data center certification to secure a $10.7 million contract with the US Securities and Exchange Commission (SEC). From 2012 through 2018, the SEC paid Company A approximately $10.7
2018 edition. Big shout out to Guy Castel who helped us pull and crunch the numbers so we could present you with the top 100 Java libraries – 2018 edition. The top 20 Java libraries for 2018. One trend that did carry out from 2017 to 2018 is the wide use of Apache libraries. Let’s check it out.
READ MORE ON MEDICAL CYBERSECURITY. Triaging modern medicine’s cybersecurity issues How to recover from a health care data breach To prevent EHR breaches, stop using them (Q&A) Ransomware attacks against hospitals: A timeline How weak IoT gadgets can sicken a hospital’s network Opinion: Who foots the bill for medical IoT security?
Could the secret to building Internet-connected devices that balance utility, safety, security, and privacy reside in the offices of Forcite, an upstart motorcycle helmet maker in Australia? READ MORE ON SECURING THE INTERNET OF THINGS. IoT manufacturers pass security buck to consumers. Have a Tesla Model 3?
government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’. Triaging modern medicine’s cybersecurity issues.
Cato Networks has spent the last five years building a cloud-based wide area network that lets individuals connect to network resources regardless of where they are. Palo Alto Networks to acquire CloudGenix for $420M. Juniper Networks acquires Boston-area AI SD-WAN startup 128 Technology for $450M.
Security has a data problem. That’s according to Kfir Tishbi, who led the engineering team at Datorama, a marketing analytics company that was acquired by Salesforce in 2018. A more direct competitor is Dig Security, which builds tools to address outstanding observability issues in security.
based cybersecurity startup, has secured a $12 million Series A investment to bring multi-factor authentication (MFA) to machine-to-machine API traffic. Prior to founding the startup in 2018, Simkin’s worked for the Department of Justice as part of its national security division. Corsha, a Washington, D.C.-based
The cloud may be the direction that much of enterprise IT is moving today, but it still remains a major source of security issues, with some 98% of all enterprises in a recent survey reporting that they have contended with a cloud-related security breach in the last 18 months. Shaked worked for some time at Magic Leap.
Elisity , a self-styled innovator that provides behavior-based enterprise cybersecurity, has raised $26 million in Series A funding. Bring CISOs into the C-suite to bake cybersecurity into company culture. ” Founded in 2018, Elisity — whose competitors include the likes of Vectra AI and Lastline — closed a $7.5
That includes two cybersecurity firms and two companies in the transportation space. Island , $250M, cybersecurity: Dallas-based enterprise browser developer Island raised a $250 million Series E at a $4.8 Aura , $140M, cybersecurity: Cybersecurity has seen its fair share of big rounds this year. billion valuation.
406 Ventures, and Matt Caulfield, founder and CEO of Oort, with a conversation around cybersecurity companies in Boston. Caulfield started Oort in 2018, and to date, has raised $18.05 To them, the area’s rich history in deep tech explains why high-tech startups, from biotech to cybersecurity companies, find success in the region.
The Internet of Things has a security problem. The past decade has seen wave after wave of new internet-connected devices, from sensors through to webcams and smart home tech, often manufactured in bulk but with little — if any — consideration to security. Security veteran Window Snyder thinks there is a better way.
Venture funding overall was still sluggish , but cybersecurity startups saw some love from investors in the first quarter of 2024. To be sure, this is not the salad days of 2021 — cybersecurity funding was still down year to year — but the sector saw its best funding quarter in three quarters. billion valuation.
Vista bought LogicMonitor in May 2018 for about $415 million. Cyera , $300M, cybersecurity: After raising a $300 million Series C led by Coatue at a $1.4 billion valuation in April, data security startup Cyera closed another $300 million windfall at more than twice its previous valuation.
PlexTrac , a Boise, ID-based security service that aims to provide a unified workflow automation platform for red and blue teams, today announced that it has raised a $10 million Series A funding round led by Noro-Moseley Partners and Madrona Venture Group. PlexTrac CEO and President Dan DeCloss.
and international quantum technology infrastructure has been built out in the last seven years since the initial Quantum Initiative Act in 2018 - with commitments to cryptography, quantum agility, networking, and computing that will reshape national security and federal operations. Domestic U.S.
Fraud prevention is big business, which is slated to be worth $145 billion by 2026, ballooning by eightfold in size compared to 2018. ” When an Identiq customer — such as an online store — sees a new customer for the first time, the store can ask other stores in Identiq’s network if they know or trust that new customer.
The Cyber Independent Testing Lab , a nonprofit organization that focuses on consumer cybersecurity, published research in December demonstrating how 28 home wireless routers fail to use even basic security techniques. D-Link takes the issues of networksecurity and user privacy very seriously.”. Slide courtesy CITL.
Women also often encounter a lack of community due to the low numbers of women in the profession, making it harder for them to find mentors and sponsors who share their workplace experiences and challenges, says Stephanie Benoit-Kurtz, a longtime IT and cybersecurity professional. There are unconscious biases, too, says Leier-Murray.
With an increasingly decentralized workforce and unprecedented demands from both business and the economy, the network as always is the all-important component of a modern IT infrastructure of an organization. A primary technology driving this evolution is the network industry, the substrate on which global organizations function seamlessly.
Every couple of years, industrial cybersecurity makes a comeback with investors — and it looks like it’s that time again now. Startup Nozomi Networks locked up a $100 million Series E from investors including Mitsubishi Electric and Schneider Electric. Founded in 2013, Nozomi has raised $266 million, per Crunchbase.
Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.
All said, Assured Allies joins with insurtech companies around the world that did manage to secure some decent funding recently, including Equisoft , Naked Insurance , Turaco and Acko. Nahir and Afik Gal, a medical doctor, started Assured Allies in 2018 after their own experiences as caregivers to aging family members.
While the prospects of striking it rich have long convinced fresh-faced hackers to dive into bug bounties like an all-consuming startup, they also serve as a suitable side hustle for hunters like Jesse Kinser, who already juggles a full-time cybersecurity job and motherhood. . How to attack security issues like Google and Microsoft just did.
The Ring doorbell spent much of 2019 getting buzzed by perceived security and privacy issues, from secret agreements with law enforcement agencies to cybersecurity practices that put its users at risk. It’s designed to be a Wi-Fi-enabled, 180-degree security camera pointed perpetually at your doorstep and your neighbors.
Actual security experts say Samsung’s tweet was a bit alarmist. Consumers face security and privacy risks from smart TVs, they say, just like any other device connected to the Internet. Those risks include smart TV makers themselves, according to a 2018 study by Consumer Reports. READ MORE ON SECURING THE INTERNET OF THINGS.
Marlon Nichols will be joining us to discuss securing seed funding. His accolades include the MVMT50 SXSW 2018 Innovator of the Year and Digital Diversity’s Innovation & Inclusion Change Agent awards. He will provide insights on how to network, craft a great pitch and target the best investors for your success.
1 - CISA: How VIPs and everyone else can secure their mobile phone use In light of the hacking of major telecom companies by China-affiliated cyber spies, highly targeted people should adopt security best practices to protect their cell phone communications. Dive into six things that are top of mind for the week ending Jan.
Tetrate , the company commercializing an open-source networking project that allows for easier data sharing across different applications, has raised $40 million. Container security acquisitions increase as companies accelerate shift to cloud. “As Founded in 2018, Tetrate formally launched in 2019 with a $12.5
Showing that there’s real investor enthusiasm for identity management platforms, Saviynt , which enables companies to secure apps, data and infrastructure in a single platform, today announced that it raised $205 million in debt from AB Private Credit Investors’ Tech Capital Solutions group.
—Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements. But even locking down a long-criticized Android privacy flaw won’t help the operating system beat its biggest security flaw: its own success. READ MORE ON ANDROID SECURITY.
Global Independent Study of 500 Senior Level Respondents Provides Clear Picture for the Future of NetworkSecurity. NetworkSecurity. This is part 3 of a 6-part series addressing The Future of NetworkSecurity findings. Greater need for secure remote access due to COVID-19. Reduce cybersecurity risk.
Security cameras, for better or for worse, are part and parcel of how many businesses monitor spaces in the workplace for security or operational reasons. Spot AI has been quietly building its technology and customer base since 2018, and already has hundreds of customers and thousands of users.
Inception Framework’s attack methodology has evolved since it was first detected in 2014 in part by Waylon Grange, senior threat researcher at computer security company Symantec. How to secure your home Wi-Fi. ”—Joshua Meyer, analyst, Independent Security Evaluators. READ MORE ON ROUTERS AND THE INTERNET OF THINGS.
If the items are further afield, Tile taps into its broader finding network consisting of everyone who has the app installed on their phone and other access points. Through this network, Tile is able to automatically and anonymously communicate the lost item’s location back to its owner through their own Tile app.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content