Despite its stock sinking to an all time low. Milpitas, CA-based FireEye acquired iSight Partners for $200m a few weeks ago. iSight is somewhat complementary to Mandiant. But still left me with the feeling that the deal had a "hail Mary" feel to it. FireEye didn't stop to breath as it announced its acquisition of Invotas. … Continue reading Invotas acquired by the all-seeing FireEye
Category: 4th Wall
Two hundred and fifty meeeeelion dollars!
If I were a betting man, I would have believed that Tenable was on its way to filing its papers for an IPO. After all, the company seemed to be growing organically nicely since its series A $50m round way back in 2012. Known primarily for Nessus, its vulnerability management product, Tenable has evolved its offering … Continue reading Two hundred and fifty meeeeelion dollars!
Like an episode of Jerry Springer
The security industry is known to be somewhat incestuous at times. The same faces can often be seen running, investing or purchasing companies. Over the recent weeks and months though, some of the M&A activity reads like an episode of Jerry Springer. In July of this year, HP declared the corporate-consumer marriage was no longer … Continue reading Like an episode of Jerry Springer
Privileged Password Policy with Thycotic
From an attacker perspective, gaining control of privileged accounts remains the Holy Grail. Using a privileged account, an attacker can not only wreak havoc within a company, but also cover its tracks to make it near impossible to detect until it’s too late. Thus adequately securing and monitoring the use of privileged accounts is a … Continue reading Privileged Password Policy with Thycotic
CyberArk acquisitions two by two
Founded in 1999, CyberArk went public in September 2014 in what was overall alukewarm affair in the security industry. However, much like the swan which appears elegant on the surface, CyberArk has been busy paddling away underwater with its second acquisition in almost as many months. Its first acquisition was Cyberintel for an undisclosed amount - … Continue reading CyberArk acquisitions two by two
Filling the infosec skills gaps with Stealth Worker
Is there an infosec skills shortage? Many industry surveys would indicate yes. And even if there isn’t a great shortage today - the rate at which new professionals are joining the security industry is outpaced by the number of company’s creating systems which need some level of security oversight. Ken Baylor, former CISO at Pivotal … Continue reading Filling the infosec skills gaps with Stealth Worker
Simulating Threats with vThreat
Protection remains an important step in the security ecosystem, yet no matter how good the prevention, human error, breakdown in processes or technological weaknesses mean these can be bypassed. While that doesn’t mean enterprises should bury their protective products in shallow graves, buying trends indicate that more investments are being made in detection and response … Continue reading Simulating Threats with vThreat
