June Top Press Hits: Funding, Tech Pioneers & Thought Leaders
Uncategorized Posted Jul 6, 2018 by Courtney Kruzement-Prykhodko
Summer is officially in full swing with a heat wave hitting Boston to round out our 4th of July holiday this week. The heat didn’t slow us down (or our clients!) as we had another successful month of company announcements and thought leaders stepping up to bat security and tech home runs. Here’s a roundup of the top news stories our clients shared this month.
The Norwalk Hour, Wilton innovators mark milestone with World Economic Forum
The World Economic Forum named Cadenza Innovation as a pioneering technology developer, one of just 61 companies globally to receive the distinction. This is CEO Christina Lampe-Onnerud’s second World Economic Forum Technology Pioneers win. Past winners of the World Economic Forum Technology Pioneers award include Google, Airbnb and Dropbox.
Claroty announced that it raised $60 million in Series B funding in June. Money aside, this was a significant accomplishment because the funds raised came from a prominent syndicate of investors, including industrial operators and control system vendors – some of which are competitors. This partnership of investors lends itself to the urgency of securing industrial sites and critical infrastructure against cyber-attacks, which requires cooperation from the private and public sectors alike.
Marcus Brown, Digital Guardian’s VP of Global Channels, sat down for a video interview with CRN to discuss how the ability to recognize unstructured data could make all the difference for a company in preventing a security breach down the road.
Duo’s Director of Advisory Chief Information Security Officers (CISOs), Wendy Nather sits down with host Steve Ragan at the RSA Conference 2018 in San Francisco, CA to discuss how organizations can build a zero-trust model, which includes consistently authenticating users. Nather breaks down the birth of zero trust, and how the model was implemented into the security world. The main idea being, don’t trust something just because it’s in the range of your network perimeter. Nather explains that the idea is not to get rid of the firewall, but rather to start raising the security on the inside of your network to match the outside, and to continue to authenticate your users, adding multi-factor authentication.
Security Boulevard, Security Mistakes that Could Cripple the Network
Lakeside Software’s Senior Product Marketing Manager, Patricia Diaz-Hymes, gives Security Boulevard insight into why the complexity of a security environment makes it very difficult for IT professionals to do their jobs. This difficulty leads to human-error, and the most common of these IT mistakes leave networks vulnerable to attackers. Patricia explains that for IT professionals, any action taken is counterproductive. If a professional installs high security software, it slows down performance, and companies will likely disable these protections for better performance. The same stands for the opposite, if performance is top of mind, security falls to the wayside. She explains that errors come from choosing one IT path over the other, making for a complex and difficult situation.
Bloomberg TV, Bloomberg Technology Full Show
Flashpoint’s Director of Intelligence, Asia-Pacific Jon Condra joined anchor Emily Chang on Bloomberg Technology TV last month. After just releasing its most recent Business Risk Intelligence (BRI) report, Flashpoint discussed the state of cybersecurity with Chang, highlighting the biggest global threats in cyber space and what they mean for the online and real world.
RiskLens CEO Nick Sanna argues that the Cyber Hygiene report card issued to federal agencies by the Department of Homeland Security’s US-CERT falls short. He says the technical vulnerability scan isn’t generating the most relevant information that decision-makers need.
Itzik Kotler, CTO & co-founder of SafeBreach, penned a byline on the topic of vulnerabilities – a word that is often misused in cybersecurity discussions. Given the number of hacks and cyber threats that occur daily, it’s hard for security teams to prioritize and understand the risks these attacks pose to the organization. Kotler details ways in which to look at the hacker’s successes rather than fixating on the vulnerabilities in an organization’s security environment, as this in itself, can be a vulnerability.