Thursday, May 30 2024

The world continues to digest the cyber security investments of the bipartisan infrastructure bill and tech continues to move forward. Netography’s concept for the atomized network realizes a substantial early capital influx. Lacework claims it has raised the largest funding round in security industry history. Biometric authentication technology intends to eliminate account takeover.  Numerous outfits prioritize the security implications of human capital.


Cybersecurity startup BlueVoyant seeks latest funding round to raise $150 million at a $1.4 billion valuation. The pandemic shutdowns have created a new focus on cybersecurity and BlueVoyant seeks to position itself as a solution to an increase in cyberattacks by criminals and state actors. Details for this latest round of funding have not been released, BlueVoyant’s current investors include the like of Temasek Holdings PTE, Winton Ventures, 8VC, and DNS Capital.  

Netography, the security company for the atomized network, secures $45 million in Series A funding. This round of funding was led by Bessemer Venture Partners and SYN Ventures, with participation from existing investors Andreessen Horowitz, Mango Capital, Harpoon Ventures, and Wing Venture Capital. The new capital will be applied toward technology development, channel expansion, and sales.   

SnapAttack, a cybersecurity firm developing both proactive and collaborative security with a single platform, announces $8 million funding round led by Volition Capital. The raise was completed in connection with SnapAttack’s recent spinoff from Booz Allen Hamilton to an independent operation. In addition to Volition Capital, participants in the raise include Strategic Cyber Ventures and Booz Allen Hamilton.

DefenseStorm realizes $5 million capital influx with investment from the Curql Collective through its Strategic Investment Fund.  As a provider of cloud-based cybersecurity, cyber compliance, and cyber fraud management, DefenseStorm is currently a regional service provider to community banks and credit unions. In the coming months, DefenseStorm intends to utilize this funding to further develop its CyberFraud offering and will continue its focus on automated compliance and cyber security offerings. 

Cloud data protection startup Laminar Ltd. exits stealth mode after closing a new round of funding at $32 million. The round was led by New York-based global venture capital and private equity firm Insight Partners, with participation from SentinelOne, TLV Partners and Meron Capital. Laminar’s approach allows autonomous data observability, which allows data protection teams to reduce attack surfaces and detect real time data leaks.

Lacework, a data focused security platform for the cloud, announces latest round of funding at a massive $1.3 billion. This round values Lacework at $8.3 billion as the company claims it is the largest funding round in security industry history. Lacework has earmarked this capital influx to globally scale its operation and further develop its product offering to expand its marketplace.


CrowdStrike agreed to acquire SecureCircle, a SaaS-based cybersecurity service that extends zero trust security to data on the endpoint. This acquisition will extend CrowdStrike’s zero trust endpoint security device and identity capabilities to include data. This all-cash transaction is expected to close during CrowdStrike’s fiscal 2021 fourth quarter.

Buchanan & Edwards Inc. (B&E) completes its acquisition of RenXTech. RenXTech offers cyber, technical, analytical, and operational support to the Federal Government and commercial sectors. “RenXTech was a great fit for us in every category. Culturally, their focus on the customer, the mission, and their employees paralleled ours, and we share common values with their team, including our companies’ shared purpose of solving challenges of national security significance to protect the American People,” said Eric Olson, CEO of BE.

Immersive Labs announces the acquisition of Snap Labs. This acquisition rests on the mutual strengths of these operations and will move forward with a focus on developing the cyber knowledge of its customer’s human capital. Immersive Labs’ new integration with Snap Labs’ operation allows customers to run cyber crisis exercises in a cloud-databased replica of their own organization.    

KnowBe4 announces it has finalized its acquisition of SecurityAdvisor with an eye to advance its fight against social engineering attacks. SecurityAdvisor focuses on analyzing real-time user behavior that poses a potential security risk and pushes micro-learning modules to educate the user in direct response to the risky behavior. With an eye to monitor end user behavior, KnowBe4’s operation focuses on a new cyber security category known as “Human Detection and Response;” which represents a set of technologies, processes and policies that focus on defending user attack and educating users to defend themselves and their company from various social engineering attacks.    

Team Cymru announces acquisition of Amplicy pursuant to undisclosed terms. Amplicy focuses on real-time attack surface mapping and inventory with an insight engine that discovers and classifies IT Assets, identifies application and infrastructure vulnerabilities, and provides risk scoring. 

Sift announces acquisition of password-less authentication operation Keyless.  Keyless’ zero-knowledge cryptography and privacy-preserving biometric authentication technology seeks to eliminate account takeover fraud due to weak or stolen passwords, phishing, and credential reuse; and will further allow users the ability to log into websites and apps simply by looking into their device’s camera.

Read more cybersecurity M&A and funding updates from SecureDisruptions here.


Cyber DealS: McAfee, Socure, Contrast Security, SCYTHE.


Cyber People Moves

Check Also


Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]