article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Enterprises, especially, tend to be methodical and plodding.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. She previously worked in enterprise technology management at Citibank, EF Hutton and Manufacturers Hanover Trust (now Chase).

article thumbnail

Enhancing Security and Reducing Costs with Advanced Zero Trust Implementation

Centraleyes

Harnessing Business Potential with Zero Trust Zero Trust Architecture has come a long way since its inception in 2009, evolving from a theoretical concept to a widely accepted framework for implementing Zero Trust cyber security. It has gained traction over the years thanks to its effectiveness in mitigating modern cyber threats.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

Involving law enforcement in incident response In a callback to a talk from the very first IRISSCON back in 2009, the head of the Garda National Cyber Crime Bureau emphasised the need for businesses to report instances of cybercrime so police can understand the nature of threat that other businesses face.

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

Breach and attack simulation (BAS): XM Cyber. XM Cyber Platform. XM Cyber launched in 2016 and is a winner for its innovation in the breach and attack simulation arena. The Tel Aviv-based vendor focuses on cyber risk analytics and cloud security software to give network administrators more robust visibility into threats.

article thumbnail

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

Centraleyes

HITRUST: An Overview On the contrary, HITRUST is an organization that introduced the HITRUST CSF (Common Security Framework) in 2009. Maximize executive-level support and decision-making with intuitive reports that highlight cyber risk in business terms. Oversee mitigation plans that are automatically created by the platform.