Cybersecurity startups are wary of the public markets following a hard economic reset that made profitability more important than growth and performance more important than potential. Due to this dramatic shift, lots of cybersecurity startups want to file for an IPO, but nobody wants to go first.
Cyera is raising between $150 million and $200 million in a new funding round that would value the Silicon Valley-based data security startup at as much as $1.55 billion. The funding talks come just nine months after Cyera closed a $100 million Series B round at a reported $500 million valuation.
Carbon Black won't be getting a new residence anytime soon after indications of interest in the organization fell short of Broadcom's expectations. The semiconductor giant had been looking to fetch $1 billion for the security firm - including debt - but offers at that dollar figure remained elusive.
Once the dust settles on the LockBit disruption, what will be the state of ransomware? Expect attackers to continue refining their tactics for maximizing profits via a grab bag of complementary strategies, including crypto-locking shakedowns and data-theft extortion.
Discover the transformative power of risk quantification with insights from Netflix's Tony Martin-Vegue, and learn why modernizing your approach could be the game-changer your risk analysis needs.
A government watchdog urged the White House to establish metrics that would help determine the effectiveness of federal cybersecurity initiatives, but it's a lot easier to recommend developing outcome-oriented performance measures for cybersecurity than it is to actually develop them.
The explosion in applications using genomic data - from drug and vaccine development and consumer ancestry testing to law enforcement work - is heightening the need to carefully address critical privacy and security concerns around this sensitive data, government authorities say in a new report.
The Cybersecurity and Infrastructure and Security Agency is urging health sector entities to take critical steps in fortifying their environments based on findings from a risk and vulnerability assessment performed by the federal agency on a healthcare industry organization earlier this year.
Winter in London features Hyde Park's Winter Wonderland, Christmas lights galore, and the return of the Black Hat Europe cybersecurity conference, featuring briefings on everything from quantum cryptography and router pwning to dissecting iOS zero-days and training generative AI to attack.
Vulnerability Management is a well-known cybersecurity essential. However the lines have blurred over the years regarding which vital practices fall under the VM classification.
The SEC recently charged SolarWinds and its CISO for fraud amid cybersecurity lapses. Most organizations are reckless in making statements to the market to preserve their company's stock prices, not realizing that this is tantamount to fraud, said experts.
In today's hyper-connected world, telecommunication service providers play a pivotal role in ensuring seamless communication, data transfer and collaboration for businesses. But the evolving threat landscape of cybersecurity continues to pose significant challenges, which Ian Keller discusses.
The financial services threat landscape is continually evolving. Matanda Doss, executive director of cybersecurity and technical controls at JPMorgan Chase, stressed the need to build security measures into an organization's infrastructure, starting with critical assets.
In this episode, Chris Foye, Senior Director of Platforms at LexisNexis® Risk Solutions, defines the increasing role of ‘orchestration’ when it comes to improving the speed, agility and efficiency of customer onboarding and ongoing lifecycle management processes.
Trick question for CSOs: When does a security incident qualify as being a data breach? The answer is that it's "a very complicated question" best left to the legal team, said former Uber CSO Joe Sullivan, sharing lessons learned from the U.S. Department of Justice's case against him.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.