Israel has become known for its security startups, and Scalock, a company that wants to secure the burgeoning container space, announced a $4 million Series A round today. The funding was provided by Israel venture capitalists TLV partners, a new fund launched earlier this year by veterans of the Israeli VC scene, Rona Segev and Eitan Bek. The […]
Posted on October 7th, 2015 by admin
Filed under: Uncategorized | No Comments »
DataGravity announced version 2.0 of its storage appliance today, one that focuses on data security, particularly knowing what files you have and who’s been accessing them. When DataGravity emerged last summer with a new concept of data aware storage, it announced a number of key features, but it found that “customers were gravitating most around security at […]
Posted on August 11th, 2015 by admin
Filed under: Uncategorized | No Comments »
Starting today, developers who use Google’s Compute Engine infrastructure as a service platform will be able to bring their own security keys to the service. Google argues that using these customer-supplied encryption keys, which are now in public beta, give its users more control over their data security. By default, Google encrypts all of the data […]
Posted on August 1st, 2015 by admin
Filed under: Uncategorized | 1 Comment »
Security Breaches – Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks and critical enterprise data. CIOs, Data center operators, network administrators, and other IT professionals need to comprehend the basics of security in order to safely deploy […]
Posted on July 31st, 2015 by admin
Filed under: Uncategorized | No Comments »
Splunk announced this evening it had purchase Caspida, a Palo Alto startup that uses machine learning techniques to help identify cyber-secruity threats from inside and outside the company, for $190 million. The deal has already closed, the company reported. Splunk helps companies deal with the onslaught of machine data coming from IT systems using data science techniques […]
Posted on July 10th, 2015 by admin
Filed under: Uncategorized | No Comments »
As malicious hacks, data breaches and other forms of cyber crime continue to persist in our networked, Internet-connected world, Sophos, a maker of antivirus software, firewall hardware and other security products for networks, individual users and servers, is going public on the London Stock Exchange. Trading now as Sophos Group plc and using the “SOPH” ticker, the company… Read More […]
Posted on June 26th, 2015 by admin
Filed under: Uncategorized | No Comments »
HackerOne, makers of a bug bounty platform where companies pay hackers to find vulnerabilities in their products, announced a $25 million Series B round today. The round was led by NEA. Benchmark, its lead Series A investor, also participated along with several prominent individual investors including Salesforce.com CEO Marc Benioff, Digital Sky Technologies Partner Yuri Milner, Dropbox… Read More […]
Posted on June 24th, 2015 by admin
Filed under: Uncategorized | No Comments »
Imagine you’re a red-blooded hacker and you want to break into a corporate network. You find your way in, probably by stealing someone’s credentials. Then you go to work. You move around until you find another lock to pick and slowly, steadily, patiently you go deeper and deeper into the network until you find the prize you’re seeking. […]
Posted on June 9th, 2015 by admin
Filed under: Uncategorized | 1 Comment »
Menlo Security, a company with a unique plan to battle malware, emerged from stealth today and also announced $25M in Series B funding. The idea is an intriguing one. Many security problems emanate from malware, which can give hackers a path into a system where they can find their way deeper in and eventually compromise the entire […]
Posted on June 9th, 2015 by admin
Filed under: Uncategorized | No Comments »
SEC now requires Companies now have to report cybersecurity risks in their 10-Ks, and asdvises them to include even possible threats whose disclosure are not currently mandated by state breach-notification laws. The SEC feels that it is better to make disclosures if a company has had a number of incidents, even if they are not […]
Posted on June 9th, 2015 by admin
Filed under: Uncategorized | No Comments »