Roughly 2/3 of all cybersecurity breaches are caused by third-party integrations. Yet, we continue to integrate these third-party solutions into technology stacks, hoping for the best. NormShield is a continuous security risk monitoring platform that quantifies the financial impact of a security breach. CEO Paul Paget walks us through the continuous cybersecurity risk monitoring market, the company’s future plans, and recent round of funding from investors that include Moore Strategic Ventures, Glasswing Ventures, and Data Point Capital.
Privacy and Security
The effects of the pandemic have accelerated digital transformation across industries and verticals and this led to an explosive shift to the cloud. Devo Technology delivers centralized cloud log management solutions powered by machine data to facilitate this shift. Designed for security and IT teams in mind, organizations can now handle the influx of data with robust analytics, workflow streams, and with insights for cross-functional teams from a single, unified platform. Boston TechWatch caught up with Chief Marketing Officer Dimitri Vlachos to learn more about Devo Technology and its latest funding round from investors that include Georgian, Bessemer Venture Partners, and Insight Partners.
For too long online users have been too willing to hand over their personal data in exchange for using mobile services (e.g., Apple, Facebook, Amazon, Google, etc.). As these companies continue to expand their footprints, untethered by regulators, into every facet of their customer’s lives there is a growing revolt.
Recently, the Interior Department ordered the grounding of its drone fleet that was made in China or contained Chinese parts. This comes on the heels of similar actions taken by the Department of Homeland Security in May and the United States Army in 2017. While political pundits credit the ban to the Trump administration’s policy initiatives […]
With a 126 percent increase in stolen sensitive personal information, there is a growing population out there worried about all the people intent on hurting them.
I’ve narrowed digital policy development down to five things you absolutely must do to protect your business, your employees, and your customers.
Cybersecurity is an epic, ongoing battle in which the good guys are companies and consumers trying to be safe, and the bad guys are the evil hackers, criminals, and nation-state spies. The good guys are led into battle by Chief Information Security Officers (CISOs) and their teams. To stay ahead of the bad guys, companies […]
Abruptly, I enter the cab escaping the arctic weather to confront something worse than freezing rain – body odor. Luckily, another taxi pulled to the curb and I continued my journey to last Tuesday’s RobotLab forum on Cybersecurity & Machines. Moderating a panel at the new Global Cyber Center, with John Frankel of ffVC and Guy Franklin of SOSA, I […]
Covert Operations has long relied on a mix of the most current technology available, and the need for an “old-school,” hands-on approach. No covert operative worth his salt would rely entirely on technology, as opening up an operation to an easy hack is almost the first danger one is warned against in training. I ran […]
Who knew that the privacy of one’s personal information would become a variable? Our parents admonished us not to write anything in a letter or note to another that we would not be comfortable seeing on the front page of The Wall Street Journal. We were well schooled in the art of bifurcating our lives […]