According to IBM, the average cost of a data breach is $4M but only 29% of businesses have a cybersecurity expert on their IT team. As businesses use more and more data and as employees use more devices (the average employee now uses 2.3 devices), the potential liability increases each day. Axonius’ cybersecurity asset management platform gives enterprises a full inventory of their assets and ensures that these devices are properly being secured. The platform takes a holistic approach by integrating into existing cybersecurity tools and workflows and ensuring that all devices being used (whether physical or virtual) are compliant with the company’s security protocols. Founded by former intelligence officers from the Israeli Defense Force, the platform solves the fragmentation problem found in enterprises when it comes to security. AlleyWatch caught up with CEO and Cofounder Dean Sysman to learn more about the complexities in managing sound cybersecurity policies throughout an enterprise, the company’s future plans, and latest round of funding from investors that include Stripes, Bessemer Venture Partners, OpenView, Lightspeed, and Vertex.
Privacy and Security
Chris Cunningham of C2 Ventures offers some predictions for what 2021 will bring to tech, covering AR, privacy, insurtech, and much, much more…
Roughly 2/3 of all cybersecurity breaches are caused by third-party integrations. Yet, we continue to integrate these third-party solutions into technology stacks, hoping for the best. NormShield is a continuous security risk monitoring platform that quantifies the financial impact of a security breach. CEO Paul Paget walks us through the continuous cybersecurity risk monitoring market, the company’s future plans, and recent round of funding from investors that include Moore Strategic Ventures, Glasswing Ventures, and Data Point Capital.
The effects of the pandemic have accelerated digital transformation across industries and verticals and this led to an explosive shift to the cloud. Devo Technology delivers centralized cloud log management solutions powered by machine data to facilitate this shift. Designed for security and IT teams in mind, organizations can now handle the influx of data with robust analytics, workflow streams, and with insights for cross-functional teams from a single, unified platform. Boston TechWatch caught up with Chief Marketing Officer Dimitri Vlachos to learn more about Devo Technology and its latest funding round from investors that include Georgian, Bessemer Venture Partners, and Insight Partners.
For too long online users have been too willing to hand over their personal data in exchange for using mobile services (e.g., Apple, Facebook, Amazon, Google, etc.). As these companies continue to expand their footprints, untethered by regulators, into every facet of their customer’s lives there is a growing revolt.
Recently, the Interior Department ordered the grounding of its drone fleet that was made in China or contained Chinese parts. This comes on the heels of similar actions taken by the Department of Homeland Security in May and the United States Army in 2017. While political pundits credit the ban to the Trump administration’s policy initiatives […]
With a 126 percent increase in stolen sensitive personal information, there is a growing population out there worried about all the people intent on hurting them.
I’ve narrowed digital policy development down to five things you absolutely must do to protect your business, your employees, and your customers.
Cybersecurity is an epic, ongoing battle in which the good guys are companies and consumers trying to be safe, and the bad guys are the evil hackers, criminals, and nation-state spies. The good guys are led into battle by Chief Information Security Officers (CISOs) and their teams. To stay ahead of the bad guys, companies […]
Abruptly, I enter the cab escaping the arctic weather to confront something worse than freezing rain – body odor. Luckily, another taxi pulled to the curb and I continued my journey to last Tuesday’s RobotLab forum on Cybersecurity & Machines. Moderating a panel at the new Global Cyber Center, with John Frankel of ffVC and Guy Franklin of SOSA, I […]