The RiskIQ Illuminate App in the CrowdStrike Store

RiskIQ’s external data sets combined with CrowdStrike’s deep endpoint data deliver security practitioners increased visibility of their entire attack …

SAN FRANCISCO, Feb. 20, 2020 (GLOBE NEWSWIRE) — RiskIQ, the global leader in attack surface management, today is pleased to announce that the RiskIQ Illuminate app is now available inside the CrowdStrike Store. The app delivers the capabilities of Illuminate, RiskIQ’s leading attack surface management platform, and pairs RiskIQ’s extensive internet intelligence with CrowdStrike’s rich endpoint telemetry. The combination of these two powerful data sets enables comprehensive visibility into an organization’s internal and external attack surface.

RiskIQ has collected, stored, and analyzed a decade’s worth of internet data to feed its technology, which discovers an organization’s external digital footprint, monitors it for threats, and enables quick and thorough threat investigations. These external data sets, unmatched in the industry, allow the Illuminate platform to function as a DVR for the Internet, giving security teams the ability to detect attacks and look back to understand why and how they happened.

RiskIQ’s external data sets combined with CrowdStrike’s deep endpoint data deliver security practitioners increased visibility of their entire attack surface and accelerate their investigation to respond more effectively to threats. As they conduct research, the RiskIQ app automatically identifies impacted endpoints. Analysts then gain a complete understanding of all related infrastructure to a given threat actor so companies can stay a step ahead of their adversaries.

“RiskIQ data powers several defense-based products and enables a community of over 85,000 security practitioners to conduct investigations into threats,” said RiskIQ PassiveTotal founder and Vice President of Strategy Brandon Dixon. “This data becomes even more powerful when combined with CrowdStrike’s endpoint telemetry.”

“CrowdStrike established the CrowdStrike Store to enable partners to bring innovation and new capabilities to market faster so that customers can more quickly spot and stop the breach,” said Andy Horwitz, vice president of CrowdStrike Store. “With RiskIQ as a partner, we can extend the power of our cloud-delivered CrowdStrike Falcon platform to provide security teams with 360-degree visibility and monitoring of their entire digital attack surface both inside and outside the firewall. This is critical for our customers to gain complete context with external internet intelligence and internal endpoint data to help accelerate threat investigation and incident response to defend their enterprise.”

Key benefits to the application include

  • Creates complete security visibility by bridging external and internal threat intelligence data in one location
  • Enriches investigations by automatically searching endpoints for indicators of compromise (IoCs) as analysts pivot
  • Displays CrowdStrike Falcon Intelligence data directly alongside detailed Internet collection data
  • Accelerates hunting or incident response engagements by surfacing related or overlapping infrastructure data
  • Identifies any visibility gaps within the organization by analyzing CrowdStrike endpoint coverage and comparing it with the organization’s attack surface

CrowdStrike customers can seamlessly trial the RiskIQ application through the CrowdStrike Store within the Falcon platform to gain a 360-degree view of their digital attack surface.

Read more about the integration here.

About RiskIQ

RiskIQ is the leader in digital attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, security teams, and CISO’s, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.

Visit or follow us on Twitter. Try RiskIQ Community Edition for free by visiting

© 2020 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.


Holly Hitchcock

Front Lines Media


Related Posts:

  • No Related Posts

wide Cloud Firewall Management Market Emerging Trends and Global Demand 2019 to 2025

… Palo Alto Networks, Fortinet, Hillstone Networks, Barracuda Networks, Juniper Networks, WatchGuard Technologies, Herjavec Group, Stromshield, …

AMR (Ample Market Research) recently published The wide Cloud Firewall Management Market report,

wide Cloud Firewall Management Market report consisting important sections which present many aspects of market with provides more information about market status, Industry Matrix, Industry decisions, Industry positioning, Current trends, forecast and much more.

The scope of the report focused on the Global and Regional purchase which is based on Threats, Opportunities, Weaknesses and Strengths with product consumption in terms of volume and value and much more.

Overview of wide Cloud Firewall Management market report:

Worldwide Cloud Firewall Management Market –Drivers, Opportunities, Trends, and Forecast: 2016—2022

Get to know overview of The wide Cloud Firewall Management market at

The market analysis objectives of this report are:

  1. The wide Cloud Firewall Management, more detailed insights and analysis.
  2. Forecast on size, sales, Purchase and more on The wide Cloud Firewall Management market.
  3. Market challenges in The wide Cloud Firewall Management market with methods used to analysis.
  4. Key major market players in The wide Cloud Firewall Management market.

Know more about Key vendors of wide Cloud Firewall Management:

Cisco Systems, Check Point Sotware Technologies, McAfee (Intel Corp), Palo Alto Networks, Fortinet, Hillstone Networks, Barracuda Networks, Juniper Networks, WatchGuard Technologies, Herjavec Group, Stromshield, Dell Security, Zscaler, Skybox Security, Smoothwall

Get the Sample report pages for The wide Cloud Firewall Management market in your email:

wide Cloud Firewall Management Market Report prepared based on an in-depth market analysis with inputs from top industry experts, various interviews, more surveys understanding of the top company’s position within a global business environment.

Competitor segment or Competitive landscape of the wide Cloud Firewall Management:

The information for each competitor includes Company Profile, Main Business Information, Sales, Revenue, Price and Gross Margin, Market Share, applications, type and regions. In addition, with choosing and using several matrices to get better evaluate the industry and marketplace of companies.

Geographically, this wide Cloud Firewall Management considered or segmented into several key regions which are based on the structural characteristics of the local economy, followed by the derivation and interpretation multipliers in terms of output, income and Market Share, Growth Opportunities, Driving Factors by Top Manufacturers, Type, Application, Market Forecast to 2024

What is covered in the wide Cloud Firewall Management market report?

  1. Overview of the wide Cloud Firewall Management market
  2. Historical, current and forecasted market size data for the wide Cloud Firewall Management market (2016 to 2023)
  3. Qualitative analysis of the wide Cloud Firewall Management market and its segments
  4. Trade analysis of wide Cloud Firewall Management
  5. Qualitative analysis of the major drivers and challenges affecting the market
  6. Analysis of the competitive landscape and profiles of major players operating in the market
  7. Key recent developments associated with the wide Cloud Firewall Management market

Get Access of a Full Report –

Why to buy wide Cloud Firewall Management market report?

  1. Get a broad understanding of the wide Cloud Firewall Management market, the dynamics of the market and current state of the sector
  2. Strategize marketing, market-entry, market expansion, and other business plans by understanding the factors driving growth in the market
  3. Be informed regarding the key developments in the wide Cloud Firewall Management market
  4. Understand major competitor’s business strategies and market dynamics and respond accordingly to benefit from the market

With the given market data, Research on Global Markets offers customization according to specific needs. Write to us at [email protected], or connect with us via +1-530-868-6979.

About Us

Ample Market Research provides comprehensive market research services and solutions across various industry verticals and helps businesses perform exceptionally well. Our end goal is to provide quality market research and consulting services to customers and add maximum value to businesses worldwide. We desire to delivery reports that have the perfect concoction of useful data. Our mission is to capture every aspect of the market and offer businesses a document that makes solid grounds for crucial decision making.

Contact Address:

William James

Media & Marketing Manager

Call: +1 (530) 868 6979

Email: [email protected]

Related Posts:

  • No Related Posts

Software firm shops new cyber watchdog

Darktrace’s Account Executive for the Caribbean Joe Viviano said :“This technology can autonomously isolate and block the threat while business …

As cyber criminals mount increasingly coordinated attacks on the websites and networks of governments and businesses, humans are turning to machines for help.

Security managers were given a demonstration ofArtificial Intelligence doing security work, in whichunique technology, offered by British-based cyber defence firm Darktrace monitors a network constantly, detects anomalies and fixes potential concerns in some cases while security folk are asleep.

More than 70 security specialists and business executives attended a seminar on Thursday organised by United Kingdom-based Darktrace and local representative, Ark Online.

Darktrace’s Account Executive for the Caribbean Joe Viviano said :“This technology can autonomously isolate and block the threat while business continues as normal.”

He explained that the AI solution is designed to become familiar with the functioning of a customer’s network and detect anomalies when they occur.

“Darktrace automatically protects the system from intrusions, either externally or from persons accessing the network from within the operation,” he added.

Andre Griffith, founder of technology firm ARK ONLINE said: “In the fight against advanced cyber criminals AI gives control back to the defenders, transforming even the most complex and vulnerable organisation into a resilient, self-defending digital business.”

Andre Griffith said Darktrace has been deployed in 105 countries with a growing adoption in Barbados and the wider Caribbean.

The security solution is scalable to large corporations and small companies as customers pay a monthly fee based on the number of installations attached tothe network.

In recent months, cyber crime came to Barbadian shores when bank customers discovered their deposits were missing. Then a hack into the Government’s registry just over six months ago resulted in the personal information of ctizens being compromised.

Related Posts:

  • No Related Posts

Botnet Detection Market 2019 Analysis and In-Depth Research on Market Dynamics, Trends …

Market report of Global “Botnet Detection Market” 2018 study report covers all main geographical regions and sub-regions in the world and focusses …


Market report of Global “Botnet Detection Market” 2018 study report covers all main geographical regions and sub-regions in the world and focusses on product sales, cost, market size and growth opportunities in these regions. The Botnet Detection market provides market research data status (2013-2017) and forecast (2018-2023) and also categorizes the Botnet Detection market into key industries, region, type and application.

The prime objective of this report is to help the user understand the market in terms of its definition, segmentation, market potential, influential trends, and the challenges that the market is facing. Deep researches and analysis were done during the preparation of the report. The readers will find this report very helpful in understanding the market in depth. The data and the information regarding the market are taken from reliable sources such as websites, annual reports of the companies, journals, and others and were checked and validated by the industry experts. The facts and data are represented in the report using diagrams, graphs, pie charts, and other pictorial representations. This enhances the visual representation and also helps in understanding the facts much better.

Get a Sample Copy of the Report at –

Data and information by manufacturer, by region, by type, by application and etc., and custom research can be added according to specific requirements.

Botnet Detection Market by Top Manufacturers:

Akamai Technologies


Distil Networks


Instart Logic


Zenedge (Oracle)

White OPS






Digital Hands

Integral AD Science

Shape Security








Stealth Security

White Diagnostic

By Component



By Services

Professional Services

Managed Services

By Application Area

Website Security

Mobile Application Security

API Security

By Deployment Mode



By Organization Size

Large Enterprise


By Industry Vertical

Retail and eCommerce

Media and Entertainment

Travel and Hospitality


IT and Telecom

Government and Defense

Healthcare and Life Sciences

Others (Education

Auction Sites

Real Estate

and Energy and Utilities)

Botnet Detection Market by Regions: –

United States





The Botnet Detection Market contains the SWOT analysis of the market. Finally, the report contains the conclusion part where the opinions of the industrial experts are included.

Points Covered in The Report:

The points that are discussed within the report are the major market players that are involved in the market such as manufacturers, raw material suppliers, equipment suppliers, end users, traders, distributors and etc.

Inquire More Or Share Questions If Any Before The Purchase On This Report —

The complete profile of the companies is mentioned. And the capacity, production, price, revenue, cost, gross, gross margin, sales volume, sales revenue, consumption, growth rate, import, export, supply, future strategies, and the technological developments that they are making are also included within the report. The historical data from 2011 to 2017 and forecast data from 2018 to 2023.

The growth factors of the market are discussed in detail wherein the different end users of the market are explained in detail.

Key Reasons to Purchase

To gain insightful analyses of the market and have comprehensive understanding of the global market and its commercial landscape.

Assess the production processes, major issues, and solutions to mitigate the development risk.

To understand the most affecting driving and restraining forces in the market and its impact in the global market.

Learn about the market strategies that are being adopted by leading respective organizations.

To understand the future outlook and prospects for the market.

Besides the standard structure reports, we also provide custom research according to specific requirements.

Detailed Table of Content 2018-2023 Global and Regional Botnet Detection Production, Sales and Consumption Status and Prospects Professional Market Research Report

Chapter 1 Industry Overview of Botnet Detection Market

Chapter 2 Production Market Analysis of Botnet Detection Market

Chapter 3 Sales Market Analysis of Botnet Detection Market

Chapter 4 Consumption Market Analysis of Botnet Detection Market

Chapter 5 Production, Sales and Consumption Market Comparison Analysis

Chapter 6 Major Manufacturers Production and Sales Market Comparison Analysis

Chapter 7 Major Type Analysis

Chapter 8 Major Application Analysis

Chapter 9 Industry Chain Analysis

Chapter 10 Global and Regional Market Forecast of Botnet Detection Market

Chapter 11 New Project Investment Feasibility Analysis

Chapter 12 Conclusions

Chapter 13 Appendix

And Many More….

Purchase This Report (Price 3500 USD for single user license) –

About Absolute Reports:

Absolute Reports is an upscale platform to help key personnel in the business world in strategizing and taking visionary decisions based on facts and figures derived from in depth market research. We are one of the top report resellers in the market, dedicated towards bringing you an ingenious concoction of data parameters.

Contact Us:

Name: Ajay More

Phone: US +1424 253 0807/ UK +44 203 239 8187

Mail id: [email protected]

For Other Report :

Low Power Wide Area Network (LPWAN) Market Mergers & Acquisitions, Expansion, Concentration Rate Outlook (2019-2024)

Cypress Oil Market boosting the growth Worldwide: Market dynamics and trends, efficiencies Forecast 2025

Bike Racks Market 2019 Revenue, Key Players, Supply-Demand, Investment Feasibility and Forecast 2024

Office Furniture Market 2019 Competition, Status and Forecast, Market Size by Players, Regions, Type, Application by 2024

Plastic Fencing Industry 2019 Global Market Growth, Trends, Revenue, Share and Demands Research Report

Related Posts:

  • No Related Posts

The Week that Was.

Newly hatched unicorn Shape Security is said to be thinking of an IPO. The Silicon Valley-based company, which specializes in anti-fraud solutions, …

CRASHOVERRIDE intended to cause long-term damage.

Analysts at Dragos have reassessed the 2016 cyberattack against Ukraine’s power grid and have concluded that the blackout was intended to be far more damaging and longer-lasting than what was actually achieved. The attack appears to have had a final stage that failed for reasons unknown to Dragos. After the blackout was triggered, the attackers tried to launch denial-of-service attacks against the Siemens SIPROTEC protective relays in use by the plant. This initially seemed pointless, since the attack had seemingly already taken place. Dragos suspects, however, that the attackers wanted the plant’s operators to reactivate the systems while lacking visibility and without realizing that the protective relays were disabled. This could have greatly intensified the attack, causing physical damage to equipment and harming employees.

Dragos’ director of threat intelligence Sergio Caltagirone told WIRED that “they’ve pre-engineered attacks that harm the facility in a destructive and potentially life-threatening way when you respond to the incident. It’s the response that ultimately harms you.”

Is your cybersecurity program aligned with your business goals and objectives?

Cybersecurity is a business risk, not an IT problem, and a critical part of business strategy. Security should not be an afterthought. Taking a proactive approach facilitates board-level cyber initiative buy in, supports traction across business units, establishes management alignment for key priorities, and manages data complexity. Let Edwards Performance Solutions better structure and position your cybersecurity program – making it a business asset for continued success. Learn more.

North Korean hackers use obscure file formats to evade detection.

Prevailion researchers describe “Autumn Aperture,” a North Korean campaign that’s deploying rarely used file formats like Kodak FlashPix (FPX) to avoid being flagged by antivirus systems. The attackers are using malicious Word files with subject matter that’s relevant to their targets, and they attempt to hide the resulting malicious functionalities by embedding them in FPX files. VirusTotal shows that these are much less likely to be detected than the standard VBA files.

Prevailion believes the Kimsuky threat actors are behind the campaign, and the researchers conclude that “given the broad scope of entities targeted by Autumn Aperture, there is an increased likelihood that a third party within an organization’s ecosystem is at risk of exposure.”

Cybersecurity Fabric: The Future of Advanced Threat Response

Cyber Attacks continue to increase in size and speed, requiring greater flexibility to defend and respond to emerging security threats. Organizations need inline detection and mitigation to be successful against threats to the evolving network. The solution is one that weaves security throughout your network into a seamless fabric providing coordinated detection and response. Join LookingGlass for our upcoming webinar October 2, 2pm EST to learn how a Cybersecurity Fabric will strengthen your security strategy, simplify your stack, and advance your defenses.

Israeli intelligence may have placed StingRays in DC.

POLITICO reported that three “three former senior officials with knowledge of the matter” said the US government concluded that Israel was responsible for the placement of a number of StingRay devices in Washington DC. One of the officials said the devices were probably intended to spy on President Trump. Israel has denied the allegations, and President Trump said, “I don’t think the Israelis were spying on us….Anything is possible but I don’t believe it.”

Every business can benefit from a cookbook approach to developing a cloud strategy.

By focusing efforts on a living document, CIO’s can connect business strategy to cloud migration planning and implementation. Visit and download the latest Gartner Cloud Strategy Cookbook, 2019  The Cloud Strategy Cookbook provides actionable advice on structuring a cloud strategy document, while offering guidance on determining which applications go where.

BlueKeep RCE exploit now available to the public.

Rapid7’s open-source Metasploit framework now has an easy-to-use module for exploiting BlueKeep to achieve remote code execution on Windows systems, ZDNet reports. The module can’t be used for worm attacks, since it requires manual interaction for each system it’s deployed against, but it’s still quite effective against individual systems. ZDNet notes that there are still 700,000 vulnerable systems exposed to the Internet, and probably many more on internal networks.

Setting the Trap with Kevin Mitnick: Crafty Ways the Bad Guys Use Pretexting to Own Your Network

Today’s phishing attacks have evolved beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization to set the perfect trap. And pretexting is the key.

Join us for this exclusive webinar where Kevin Mitnick, the World’s Most Famous Hacker and KnowBe4’s Chief Hacking Officer, will show you how the bad guys craft such cunning attacks. And he’ll share some hacking demos that will blow your mind.

Save your spot!

Thrip cyberespionage group isn’t new after all.

Symantec told CyberScoop that it believes the Chinese threat actor the company tracks as “Thrip” could actually be a manifestation of another group, “Billbug” or “Lotus Blossom,” which has been active for about a decade. Symantec previously believed Thrip was a new operation discovered last year, but an analysis of one of its backdoors uncovered multiple striking similarities to a tool used by the older threat actor. Symantec’s technical director Vikram Thakur told CyberScoop that “these guys are not absolutely brand new like we had pointed out last year. They seem to be using an evolution of a tool that has almost been used for ten years at this point.”

Cobalt Dickens is back, and pretending to be your university library.

Researchers at Secureworks report a resurgence of activity by the Iranian threat group called “Cobalt Dickens.” The threat actor has been associated with the Mabna Group and others the US Department of Justice indicted in 2018 in connection with cyberespionage Justice said was conducted on behalf of Iran’s Islamic Revolutionary Guard Corps. Secureworks says the latest activity consists of a phishing campaign directed against American and British universities.

Stealth Falcon spyware campaign update.

ESET says it’s associated a hitherto overlooked backdoor with Stealth Falcon. Stealth Falcon itself has been connected by the University of Toronto’s Citizen Lab with the distribution of spyware against a range of Middle Eastern targets. It’s regarded as being, probably, a United Arab Emirates’ operation, linked to Project Raven, earlier described by Reuters.

Big business email compromise.

Toyota Boshoku, a Toyota parts unit, continues to investigate a business email compromise scam in a European subsidiary that may have cost the company ¥4 billion (approximately $37 million). According to Infosecurity Magazine, the incident occurred on August 14th, and if it followed the usual business email compromise template, the theft depended on social engineering. Toyota Boshuku says can’t reveal more because of ongoing police investigations. It does say it’s working to recover the funds its subsidiary lost, and it asks for patience and understanding until investigations are complete.

Patch news.

Microsoft fixed seventy-nine security flaws on Patch Tuesday, seventeen of which were rated critical. KrebsOnSecurity notes that two of these vulnerabilities affected all supported versions of Windows and were being exploited in the wild.

Adobe patched two critical vulnerabilities in Flash Player that could have led to arbitrary code execution.

Crime and punishment.

The US Department of Justice announced on Tuesday that an international law enforcement effort called “Operation reWired” had resulted in the arrests of 281 people allegedly involved in business email compromise schemes. The operation involved law enforcement agencies in Nigeria, Ghana, Turkey, France, Italy, Japan, Kenya, Malaysia, and the United Kingdom, along with the United States’ Department of Homeland Security, Department of the Treasury, Postal Inspection Service, and Department of State. 167 of the arrested individuals were in Nigeria and 74 were in the United States. The FBI also released updated statistics on BEC attacks, showing that there has been “a 100 percent increase in identified global exposed losses” between May 2018 and July 2019.

The Washington Post reported that Fedir Hladyr, a Ukrainian national US prosecutors said was affiliated with the FIN7 cybercriminal gang, took a quilty plea Thursday to two counts of hacking and wire fraud. Mr. Hladyr, who was arrested in Germany last year, was FIN7’s admin. The group is believed responsible for carding and other forms of cybercrime that may have netted them a billion dollars, give or take a baker’s dozen. In exchange for his plea, the Government agreed to drop twenty-four other charges, conviction on which would have earned the defendant hundreds of years in prison. As it stands he faces up to twenty-five years. Observers speculate that the Government made the deal in exchange for information Mr. Hladyr may provide on the rest of the gang.

Two Coalfire employees were arrested while conducting a physical penetration test at a courthouse in Iowa, according to the Des Moines Register. The two men had been hired by the state court administration to try to gain unauthorized access to court records, but the administration says it “did not intend, or anticipate, those efforts to include the forced entry into a building.” The pentesters have been charged with third-degree burglary and possession of burglary tools, and as of this writing they’re being held on a $50,000 bond.

Courts and torts.

Google will pay €965 million ($1.1 billion) to France to settle a four-year-long probe into whether the company avoided paying taxes in the country, Reuters reports.

Cloudflare voluntarily disclosed in a regulatory filing with the US Securities and Exchange Commission that its services may have been used by persons or organizations currently under US sanctions, the Wall Street Journal reported. The parties the company dealt with (presumably without fully understanding who they were) included some designated as terrorists or narcotraffickers.

Policies, procurements, and agency equities.

US President Trump yesterday extended the “National Emergency With Respect To Foreign Interference In or Undermining Public Confidence In U.S. Elections” for one year. The extension maintains the provisions of Executive Order 13848, issued on September 12, 2018, in force.

France’s finance minister said at an OECD conference that Facebook’s Libra cryptocurrency should be blocked in Europe, and he suggested that the EU should develop its own public digital currency, Cointelegraph reports. Libra’s head of policy and communications told the Independent that “we welcome this scrutiny and have deliberately designed a long launch runway to have these conversations, educate stakeholders and incorporate their feedback in our design.”

US Federal agencies are working out roles and responsibilities in cyberspace during the course of wargames. Breaking Defense describes the exercises as bringing together organizations from the Departments of Defense and Homeland Security. The US Defense Department has also offered Congress a look at some of its current thinking on cyber deterrence. Deterrence is commonly thought of as involving the credible threat of retaliation, but the Department calls its approach to deterrence “multifaceted,” with denial playing a significant part. An adversary can be deterred if they became convinced that their attacks would be futile.

Charles Kupperman, Fox News reports, will serve as interim National Security Advisor to the US President. Kupperman had been serving as deputy to the now-departed John Bolton. A search for a permanent replacement is in progress.

NIST is seeking public comment on the Final Public Draft of NIST Special Publication (SP) 800-160 Volume 2, “Developing Cyber Resilient Systems: A Systems Security Engineering Approach.” The comment period closes on November 1st. The Institute has also released a preliminary draft of the new NIST privacy framework. Comments on this draft are due by October 24th.

Fortunes of commerce.

Symantec, as it goes through Broadcom’s acquisition of its enterprise security business, and as other investors show an interest in its Norton and LifeLock units (the Wall Street Journal says suitors may be offering more than $16 billion), has begun a round of layoffs. The San Francisco Chronicle reports that the company has begun layoffs in California, cutting one-hundred-fifty-two jobs at its corporate headquarters in Mountain View, eighteen in San Francisco, and thirty-six in Culver City.

The Wikimedia Foundation received a $2.5 million donation from Craigslist founder Craig Newmark. The money is intended to help the organization boost its cybersecurity in the wake of a DDoS attack that hit Wikipedia last weekend, Infosecurity Magazine reports.

Mergers and acquisitions.

Akamai is acquiring Exceda, its largest Latin American channel partner. In statements published by BNamericas, Akamai says that it sees the acquisition as a step toward meeting increased regional demand for its content delivery and cloud security services.

Investments and exits.

Cloudflare priced its IPO this week at a share price of $15, which should give the company a market capitalization of about $4.4 billion, PitchBook reports. The lead underwriters are Goldman Sachs, JP Morgan, and Morgan Stanley.

As expected, Colorado-based Ping Identity has filled for its IPO. The company will offer $12.5 million shares of common stock, which it expects to fetch between $14 and $16 a share.

Newly hatched unicorn Shape Security is said to be thinking of an IPO. The Silicon Valley-based company, which specializes in anti-fraud solutions, has raised $51 million in an investment round led by C5 Capital, VentureBeat says. Seven other firms also participated: Kleiner Perkins, HPE Growth, Norwest Ventures Partners, Focus Ventures, JetBlue Technology Ventures, Top Tier Capital Partners, and Epic Ventures. When will there be an IPO? That’s not known, but Shape’s Chief Marketing Officer told VentureBeat that “preparation for an IPO is part of our plan.”

HackerOne has raised $36.4 million in a Series D funding round. VentureBeat reports that the round was led by led by Valor Equity Partners, with participation from Benchmark, New Enterprise Associates, Dragoneer Investment Group, and EQT Ventures.

Threat intelligence startup Cyware Labs has raised $3 million in a seed funding round led by Emerald Development Partners. The company intends to use the funding for the usual growth purposes: product development and increased marketing.

Snyk, whose specialty is detecting and fixing vulnerabilities in open-source code, has raised $70 million. TechCrunch says the funding round was led by Accel, GV, and Boldstart Ventures.

Virginia-based Shift5, which specializes in software and hardware security for weapons and aerospace systems, has raised a $2.5 million seed round. Squadra Ventures led the round, with participation by Lamphere Capital, Outland, Nue Capital, and Emerging Ventures.

Lacework, the Silicon Valley-based cloud-security shop, has closed a $42 million investment round with Sutter Hill Ventures and Liberty Global Ventures. Lacework intends to use the funding to maintain its momentum in DevOps and workload security.

And security innovation.

New Zealand has decided to offer assistance to other Pacific nations as they develop their cybersecurity capabilities. The Government has decided, ZDNet reports, to earmark NZ$10 million over the next five years in aid.

SINET has announced this year’s SINET 16. This annual selection of the most innovative, potentially disruptive companies in the cybersecurity industry picks sixteen winners from an international pool of applicants. This year’s selection was made from among one-hundred-sixty-one companies based in eighteen countries. In reverse alphabetical order, the SINET 16 class of 2010 includes:

  • XM Cyber, which specializes in fully automatic breach and attack simulation that enables customers to recognize attack vectors and prioritize their remediation.

  • Tigera, whose zero-trust network security supports continuous compliance for Kubernetes platforms across a range of environments.

  • Tempered Networks, which provides simple and affordable means of segmenting and isolating control systems and industrial Internet-of-things devices.

  • Sonrai Security, with a Cloud Data Control (CDC) service that delivers a risk model for identity and data relationships across a range of cloud and third-party data stores.

  • Siemplify. an  independent security orchestration, automation and response provider whose workbench enables enterprises and managed security service providers. to manage and respond to cyber threats.

  • OPAQ delivers security-as-a-service from its cloud that enables enterprises to overcome staffing and management challenges in the protection of their IT infrastructure.

  • Kenna Security, whose platform delivers cyber risk predictions that enable security teams to get ahead of exploitation.

  • Karamba Security’s embedded cybersecurity solutions protect connected systems with automated runtime integrity software that does particularly well against remote code execution.

  • CyberSponse, which offers an automated incident response orchestration platform that automates security tools to make human experts more effective.

  • CryptoMove, whose continuous moving target defense and distributed fragmentation offers a new approach to data protection for managing keys and DevSecOps secrets.

  • BigID, a machine-learning shop that enables personal data discovery, correlation, and privacy automation for compliance at scale with regulations like GDPR and CCPA.

  • Balbix, whose specialized artificial intelligence delivers continuous and predictive assessment of breach risk.

  • Awake Security, which offers advanced network traffic analysis for a privacy-aware solution that can detect and visualize incidents in full forensic context.

  • Arkose Labs, which solves fraud by pairing global telemetry with an enforcement challenge to control fraud without false positives or degraded throughput.

  • Aqua Security, which secures container-based and cloud-native applications from development to production.

  • And, finally, Acceptto, which delivers continuous identity access protection by inferring contextual data to analyze and verify user identity and behavior.

The sixteen winners will be featured at the SINET Showcase in Washington, DC, November 6th and 7th at the National Press Club.

Related Posts:

  • No Related Posts