Cybersecurity

Cybersecurity Startups & Investments News

Cybersecurity is one of the hottest markets for innovation and funding. These opportunities have given rise to a new ecosystem of cybersecurity startups of which, some will emerge as new leaders in the years to come.

Top news of the week: 12.01.2022.

#cybersecurity
#tech
#Paytech
#framework
#FFnews
#cyberthreats
#interviewquestions
#interview
#Fintech
#supplychain

Innovations And Trends

@fintechf shared
On Jan 6, 2022
iProov Announces $70M Investment from Sumeru Equity Partners https://t.co/yxqzzLHGuS #Fintech #Paytech #FFnews https://t.co/ht2gh4Ckmd
Open
iProov Announces $70M Investment from Sumeru Equity Partners

iProov Announces $70M Investment from Sumeru Equity Partners

iProov, the world leader in online biometric face authentication, today announced a $70 million growth investment from Sumeru Equity Partners

@hackernoon shared
On Jan 7, 2022
"Your Guide to Cybersecurity Frameworks" https://t.co/G2GTmPtZqz #cybersecurity #framework
Open
Your Guide to Cybersecurity Frameworks

Your Guide to Cybersecurity Frameworks

There are three main categories of security frameworks: Control Frameworks, Program Frameworks, and Risk Frameworks. Here we explore their differences.

@hackernoon shared
On Jan 8, 2022
"What is the “Living off the Land”(LotL) Attack Tactic in Cybersecurity?" https://t.co/BrghjjFFq8 #cybersecurity #cyberthreats
Open
What is the “Living off the Land”(LotL) Attack Tactic in Cybersecurity?

What is the “Living off the Land”(LotL) Attack Tactic in Cybersecurity?

Picture a mouse that enters a house when the door is left open.

@hackernoon shared
On Jan 11, 2022
"3 Outside-the-box Questions to Ask During a Cybersecurity Interview" https://t.co/cqiG5CHEef #interview #interviewquestions
Open
3 Outside-the-box Questions to Ask During a Cybersecurity Interview

3 Outside-the-box Questions to Ask During a Cybersecurity Interview

When interviewing, I initially used the popular lists you find via Google. This led to asking questions that candidates that made selection even more difficult.

@insurtechforum shared
On Jan 11, 2022
RT @Sharleneisenia: Prediction Consensus: What the Experts See Coming in 2022 via @VisualCap #tech #technology #crypto #NFTs #supplychain #ransomware @anand_narang @TheAdityaPatro @Khulood_Almani @RLDI_Lamy @insurtechforum @AshokNellikar @baski_LA @jeancayeux @vanivina9 https://t.co/zqlX7uafBh https://t.co/us5tY6QekW
Open
Prediction Consensus: What the Experts See Coming in 2022

Prediction Consensus: What the Experts See Coming in 2022

We analyzed 300+ articles, reports, and interviews to answer the question: is there any consensus on 2022 predictions? Here are the results.

@DrInfoSec shared
On Jan 10, 2022
FBI: Cyber criminals are mailing out USB drives that install ransomware | ZDNet https://t.co/y6mpsIff8p [if it's too good to be true...]
Open
Ransomware warning: Cyber criminals are mailing out USB drives that install malware

Ransomware warning: Cyber criminals are mailing out USB drives that install malware

Don't insert USB drives from unknown sources, even if they're addressed to you in the post.

@hackernoon shared
On Jan 11, 2022
"Automatically Scan Your Project Dependencies for Vulnerabilities Using Docker, Jenkins (Part 1/2)" https://t.co/XA162f9Xi3 #docker #jenkins
Open
Automatically Scan Your Project Dependencies for Vulnerabilities Using Docker, Jenkins (Part 1/2)

Automatically Scan Your Project Dependencies for Vulnerabilities Using Docker, Jenkins (Part 1/2)

Find out how to automatically check your software projects for potential vulnerabilities caused by 3rd party code.

@hackernoon shared
On Jan 10, 2022
"Who Should the CISO Report to?" https://t.co/qJOOxNwOHx #ciso #cybersecurity
Open
Who Should the CISO Report to?

Who Should the CISO Report to?

Should the CEO be the sole decision-maker for a CISO's plans?