Remove 2009 Remove Cyber Risk Remove Technology
article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Enterprises, especially, tend to be methodical and plodding. So what is Brinqa bringing to the table?

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.

article thumbnail

Best Network Security Tools 2021

eSecurity Planet

Breach and attack simulation (BAS): XM Cyber. XM Cyber Platform. XM Cyber launched in 2016 and is a winner for its innovation in the breach and attack simulation arena. The Tel Aviv-based vendor focuses on cyber risk analytics and cloud security software to give network administrators more robust visibility into threats.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

The operational technology challenge Ferguson outlined evolving threats to critical infrastructure, and how IT and operational technology environments are becoming increasingly interconnected and interdependent. It misused operational technology to make changes in the operating environment.

article thumbnail

Enhancing Security and Reducing Costs with Advanced Zero Trust Implementation

Centraleyes

With the “assume breach” idea firmly nested, every interaction between people, processes, data, and technology is inspected because… you just never know. It has gained traction over the years thanks to its effectiveness in mitigating modern cyber threats. Now, what’s worse than a breach?

article thumbnail

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

Centraleyes

HITRUST: An Overview On the contrary, HITRUST is an organization that introduced the HITRUST CSF (Common Security Framework) in 2009. HITRUST enhances data security through its adaptable framework, designed to address evolving healthcare mandates, laws, regulations, and emerging technologies.