Thursday, April 11 2024

Recent cybersecurity companies that closed funding rounds, public offerings, mergers and acquisitions involving financial and strategic buyers announced this week.

This week’s highest venture funding rounds involved operational technology and supply chain security companies. This week saw acquisition transactions also involving and supply chain security and industrial cybersecurity companies.

Funding

Finite State, an Ohio-based provider of supply chain security for connected devices and critical infrastructure, has raised $30 million in a Series B funding round led by Energize Ventures, which seeks investments in early and growth-stage technology companies. Schneider Electric Ventures and Merlin Ventures also participated in the round.

Nozomi Networks, a San Francisco-headquartered operational technology (OT) and internet of things (IoT) security company offering visibility into industrial control systems, has secured $100 million in a Series D funding round headed by Triangle Peak Partners, with additional investments from companies including Honeywell Ventures, Keysight Technologies, and Porsche Ventures.

Seedata.io, a London-based cybersecurity startup that helps businesses detect data leakage incidents, has raised $892 thousand in a pre-seed funding round fulfilled by numerous individual investors including ComplyAdvantage founder Charles Delingpole and Intec Telecom Systems co-founder Tom James, as well as venture capital firms CyLon and Triple Point.

Venari Security, a London-based cybersecurity company that provides threat detection, encrypted traffic analysis, and cryptographic and regulatory compliance solutions, has secured £4.2 million in a Series A funding round backed by individual investors including former Palo Alto Networks president Lane Bess and former Sungard chief executive officer Cris Conde.

Mergers and acquisitions

Checkmarx, an application security testing company based in Israel, has acquired open-source supply chain security company Dustico. “With Dustico, we’re building on our mission to secure open source by enabling customers to perform vulnerability, behavioral, and reputational analysis from a single solution. This will give developers and security leaders the insights and confidence needed to choose safer code packages, and in turn, build more secure applications at speed,” stated Maty Siman, Checkmarx chief technology officer.

Sophos has announced its acquisition of Refactr, a Seattle-based DevSecOps startup. With its third acquisition this year, Sophos aims to optimize its managed threat response (MTR) and extended detection and response (XDR) capabilities with Refactr’s security orchestration automation and response (SOAR) capabilities.

CDW, an Illinois-based IT solutions company, has acquired Focal Point Data Risk, a Florida-based cybersecurity services provider. “Adding Focal Point’s array of security consulting, customer workforce skills development and professional services capabilities expands CDW’s services portfolio and enhances our ability to address risks posed by malicious cyber threats and cyber workforce shortages, while helping customers successfully navigate shifting data protection laws,” said CDW chief executive officer Christine Leahy.

Deloitte has acquired aeCyberSolutions, the industrial cybersecurity solutions division of Applied Engineering Solutions. With the acquisition, Deloitte will enhance its existing cybersecurity offerings by integrating aeCyberSolution’s industrial control systems/operational technology (ICS/OT) security into their own offerings.

Ivanti, a Utah-headquartered software company, has acquired RiskSense, a California-based penetration testing and cloud-based vulnerability management company. The acquisition will enhance Ivanti’s abilities to help organizations shrink their attack surface, prioritize vulnerabilities to remediate, and reduce their exposure to cyber threats and ransomware attacks by taking a proactive, risk-based approach to patch management.

Previous

Cyber Executive Moves: SentinelOne

Next

Cyber Executive Moves: Huobi, OneSpan, TSG

Check Also

Widget

Don’t Miss

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]

AT&T AlienVault Products Review: OSSIM vs USM

Ellie Buscemi

AlienVault is now the technological basis for AT&T AlienLabs and provides multiple products for different companies’ cybersecurity needs. What AT&T AlienVault Products are Available? In December 2021, CISOstack reported that AT&T intended to acquire AlienVault to expand its cybersecurity offerings to more businesses. Two years later, AlienVault-based offerings make up a large portion of AT&T’s […]

Photo by Simon Kadula on Unsplash.

Navigating Manufacturing IIoT Cybersecurity Challenges

John Powers

Guarding the Gears: Government policy and industry collaboration to mitigate cyberthreats to manufacturers. The smart factory is on the rise. Production lines equipped with advanced sensors can monitor equipment health in real-time and predict potential issues before they disrupt operations. Temperature and humidity sensors can ensure the optimal environment for delicate manufacturing processes. RFID-enabled asset […]

Best Microsegmentation Software

Ellie Buscemi

Microsegmentation allows a company to divide digital assets into smaller, more secure groups, which makes it harder for cybercriminals to take over a company’s data center. What is Microsegmentation? Microsegmentation refers to cyber professionals building layers of cybersecurity protection between groups of digital assets or individual cyber assets. Adding these layers inside instead of only […]

Best Breach and Attack Simulation Platforms

Ellie Buscemi

Breach and attack simulation (BAS) platforms allow companies to see weaknesses in their cyber infrastructures before a malicious hacker can exploit them. What Is BAS – Breach and Attack Simulation? Breach and attack simulation (BAS) is an approach to cybersecurity that uses advanced tools to imitate the attacks used by cybercriminals on companies’ digital infrastructure. […]

Ofer Ben-Noon and Ohad Bobrov

Palo Alto Networks to Acquire Talon

Ellie Buscemi

On Monday, Palo Alto Networks agreed to acquire Israeli startup Talon Cyber Security, an enterprise browser platform. The deal values Talon at between $600 to $700 million, according to The Information. Palo Alto will integrate Talon’s enterprise browser solution into its Prisma SASE product. The acquisition comes among a wave of acquisitions and releases involving […]