article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Brinqa was founded in 2009 by Amad Fida and Hilda Perez, industry veterans seeking to leverage their collective expertise in risk management and identity and access management. Early on, a customer of their cyber risk management solution asked if they could assess a physical location, down to the fire extinguishers. “It

article thumbnail

Cyber Security Roundup for May 2021

Security Boulevard

The Problem with Website Passwords (from Blog Post from 2009). Which is more Important: Vulnerability Scans Or Penetration Tests? Passwords are and have always been an Achilles Heel in Cybersecurity. Stay safe and secure. Should Doctors Receive a Cybersecurity Education? The Future of Service Management in the DevOps Era.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Founded in 2009, a16z already has an extensive track record of success, investing in over 500 companies and producing 160 exits. Formerly located in Cambridge, Massachusetts, Greylock migrated headquarters to Menlo Park, California, in 2009. Insight Partners. NightDragon. Tiger Global Management.

article thumbnail

A Quick Beginner Guide to Master Metasploit

Hacker's King

Over the years, Metasploit has grown to include a vast array of tools and modules, making it indispensable for penetration testing and security assessments. In 2009, Metasploit was acquired by Rapid7, a leading cybersecurity company. This makes managing large-scale penetration tests much easier.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Penetration testing and red teamers are critical for remaining vigilant in an ever-changing threat environment and catching the vulnerabilities otherwise missed. However, it wasn’t until 2009 that a graduate student published research on fully homomorphic encryption (FHE) and set off an exploration period.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Headquartered in Kyiv, Hacken was also founded in 2017 and offers solutions in three areas: blockchain security, penetration testing , and security assessments. Starting with Bitcoin (BTC) in 2009, it’s the on and off again hype of cryptocurrency that’s led the blockchain technology movement.

article thumbnail

HITRUST vs. HIPAA: Ensuring Data Security and Compliance

Centraleyes

HITRUST: An Overview On the contrary, HITRUST is an organization that introduced the HITRUST CSF (Common Security Framework) in 2009. These controls encompass HITRUST penetration testing requirements and multiple other security assessments, which must be performed at least once a year. HITRUST to Release CSF Version 11.0