Monday, April 22 2024

The world continues to digest the cyber security investments of the bipartisan infrastructure bill and tech continues to move forward. Netography’s concept for the atomized network realizes a substantial early capital influx. Lacework claims it has raised the largest funding round in security industry history. Biometric authentication technology intends to eliminate account takeover.  Numerous outfits prioritize the security implications of human capital.

Funding

Cybersecurity startup BlueVoyant seeks latest funding round to raise $150 million at a $1.4 billion valuation. The pandemic shutdowns have created a new focus on cybersecurity and BlueVoyant seeks to position itself as a solution to an increase in cyberattacks by criminals and state actors. Details for this latest round of funding have not been released, BlueVoyant’s current investors include the like of Temasek Holdings PTE, Winton Ventures, 8VC, and DNS Capital.  

Netography, the security company for the atomized network, secures $45 million in Series A funding. This round of funding was led by Bessemer Venture Partners and SYN Ventures, with participation from existing investors Andreessen Horowitz, Mango Capital, Harpoon Ventures, and Wing Venture Capital. The new capital will be applied toward technology development, channel expansion, and sales.   

SnapAttack, a cybersecurity firm developing both proactive and collaborative security with a single platform, announces $8 million funding round led by Volition Capital. The raise was completed in connection with SnapAttack’s recent spinoff from Booz Allen Hamilton to an independent operation. In addition to Volition Capital, participants in the raise include Strategic Cyber Ventures and Booz Allen Hamilton.

DefenseStorm realizes $5 million capital influx with investment from the Curql Collective through its Strategic Investment Fund.  As a provider of cloud-based cybersecurity, cyber compliance, and cyber fraud management, DefenseStorm is currently a regional service provider to community banks and credit unions. In the coming months, DefenseStorm intends to utilize this funding to further develop its CyberFraud offering and will continue its focus on automated compliance and cyber security offerings. 

Cloud data protection startup Laminar Ltd. exits stealth mode after closing a new round of funding at $32 million. The round was led by New York-based global venture capital and private equity firm Insight Partners, with participation from SentinelOne, TLV Partners and Meron Capital. Laminar’s approach allows autonomous data observability, which allows data protection teams to reduce attack surfaces and detect real time data leaks.

Lacework, a data focused security platform for the cloud, announces latest round of funding at a massive $1.3 billion. This round values Lacework at $8.3 billion as the company claims it is the largest funding round in security industry history. Lacework has earmarked this capital influx to globally scale its operation and further develop its product offering to expand its marketplace.

MERGERS AND ACQUISITIONS

CrowdStrike agreed to acquire SecureCircle, a SaaS-based cybersecurity service that extends zero trust security to data on the endpoint. This acquisition will extend CrowdStrike’s zero trust endpoint security device and identity capabilities to include data. This all-cash transaction is expected to close during CrowdStrike’s fiscal 2021 fourth quarter.

Buchanan & Edwards Inc. (B&E) completes its acquisition of RenXTech. RenXTech offers cyber, technical, analytical, and operational support to the Federal Government and commercial sectors. “RenXTech was a great fit for us in every category. Culturally, their focus on the customer, the mission, and their employees paralleled ours, and we share common values with their team, including our companies’ shared purpose of solving challenges of national security significance to protect the American People,” said Eric Olson, CEO of BE.

Immersive Labs announces the acquisition of Snap Labs. This acquisition rests on the mutual strengths of these operations and will move forward with a focus on developing the cyber knowledge of its customer’s human capital. Immersive Labs’ new integration with Snap Labs’ operation allows customers to run cyber crisis exercises in a cloud-databased replica of their own organization.    

KnowBe4 announces it has finalized its acquisition of SecurityAdvisor with an eye to advance its fight against social engineering attacks. SecurityAdvisor focuses on analyzing real-time user behavior that poses a potential security risk and pushes micro-learning modules to educate the user in direct response to the risky behavior. With an eye to monitor end user behavior, KnowBe4’s operation focuses on a new cyber security category known as “Human Detection and Response;” which represents a set of technologies, processes and policies that focus on defending user attack and educating users to defend themselves and their company from various social engineering attacks.    

Team Cymru announces acquisition of Amplicy pursuant to undisclosed terms. Amplicy focuses on real-time attack surface mapping and inventory with an insight engine that discovers and classifies IT Assets, identifies application and infrastructure vulnerabilities, and provides risk scoring. 

Sift announces acquisition of password-less authentication operation Keyless.  Keyless’ zero-knowledge cryptography and privacy-preserving biometric authentication technology seeks to eliminate account takeover fraud due to weak or stolen passwords, phishing, and credential reuse; and will further allow users the ability to log into websites and apps simply by looking into their device’s camera.

Read more cybersecurity M&A and funding updates from SecureDisruptions here.

Previous

Cyber DealS: McAfee, Socure, Contrast Security, SCYTHE.

Next

Cyber People Moves

Check Also

Widget

Don’t Miss

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]

AT&T AlienVault Products Review: OSSIM vs USM

Ellie Buscemi

AlienVault is now the technological basis for AT&T AlienLabs and provides multiple products for different companies’ cybersecurity needs. What AT&T AlienVault Products are Available? In December 2021, CISOstack reported that AT&T intended to acquire AlienVault to expand its cybersecurity offerings to more businesses. Two years later, AlienVault-based offerings make up a large portion of AT&T’s […]

Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. Production lines equipped with advanced sensors can monitor equipment health in real-time and predict potential issues before they disrupt operations. Temperature and humidity sensors can ensure the optimal environment for delicate manufacturing processes. RFID-enabled asset […]

Best Microsegmentation Software

Ellie Buscemi

Microsegmentation allows a company to divide digital assets into smaller, more secure groups, which makes it harder for cybercriminals to take over a company’s data center. What is Microsegmentation? Microsegmentation refers to cyber professionals building layers of cybersecurity protection between groups of digital assets or individual cyber assets. Adding these layers inside instead of only […]

Best Breach and Attack Simulation Platforms

Ellie Buscemi

Breach and attack simulation (BAS) platforms allow companies to see weaknesses in their cyber infrastructures before a malicious hacker can exploit them. What Is BAS – Breach and Attack Simulation? Breach and attack simulation (BAS) is an approach to cybersecurity that uses advanced tools to imitate the attacks used by cybercriminals on companies’ digital infrastructure. […]

Ofer Ben-Noon and Ohad Bobrov

Palo Alto Networks to Acquire Talon

Ellie Buscemi

On Monday, Palo Alto Networks agreed to acquire Israeli startup Talon Cyber Security, an enterprise browser platform. The deal values Talon at between $600 to $700 million, according to The Information. Palo Alto will integrate Talon’s enterprise browser solution into its Prisma SASE product. The acquisition comes among a wave of acquisitions and releases involving […]