Merry Xmas and a Happy New Year!
Analysis of cyber security technology and research. A window on the innovation ecosystem.
Friday, 20 December 2013
Wednesday, 27 November 2013
Acquisition follows series A for PasswordBox
Password management software company PasswordBox appears to have quickly spent some of its recent $6M funding on acquiring a complementary offering. 'Legacy Locker' is a digital afterlife service that – should you pass on without passing on your passwords – grants access to your online assets to friends and loved ones.
And not long after PasswordBox reached the million user landmark too. Definitely one worth tracking.
And not long after PasswordBox reached the million user landmark too. Definitely one worth tracking.
Friday, 8 November 2013
HyTrust buys High Cloud for ... Cloud Security
Or as GigaOm puts it - the land grab for cyber security rages on. HyTrust, a provider of products to secure virtual environments, has bought HighCloud Security, a specialist in encryption and key management. HyTrust has previously received some $29m dollars in VC.
Friday, 1 November 2013
Intellectual Ventures demands $310m for Cyber Security patent fees
Intellectual Ventures, the notable patent troll, is demanding $310m from Symantec and Trend Micro for the use of patents it has the rights to, according to Computer Business Review . I should imagine this will strke fear in a lot of cyber security companies.
I am not sure about their defence though, based on the idea that a patent acquired for less than a million dollars could not be worth so much. Until the legal process is resolved this may, however, raise the price of cyber security patents on the market.
I am not sure about their defence though, based on the idea that a patent acquired for less than a million dollars could not be worth so much. Until the legal process is resolved this may, however, raise the price of cyber security patents on the market.
Thursday, 24 October 2013
Bromium raises $40m for secure micro virtual machines
According to my database this is the largest startup investment in cyber security since FireEye raised $50m back in January.
Sunday, 15 September 2013
Cyber Security Start-up Accelerator Launched
The MACH37™ Cyber Accelerator has been set up at the Centre for Innovative Technology at Virginia Tech. It is modelled on existing accelerators, such as Y Combinator, TechStars and 500 Startups, but specializes in cyber security start-ups. A number of new companies were announced as the first intake, and benefiting from a $2.5m investment.
Wednesday, 4 September 2013
Software and Network Security Patent Portfolio Acquisition Opportunities
Security related patent portfolios for sale from ICAP patent brokerage. The assets available for sale disclose innovations including:
•Message Authentication
•Gesture Recognition System
•Secure Data Access
•and more
Read more: http://www.digitaljournal.com/pr/1448042#ixzz2dvVsESYD
•Message Authentication
•Gesture Recognition System
•Secure Data Access
•and more
Read more: http://www.digitaljournal.com/pr/1448042#ixzz2dvVsESYD
Friday, 23 August 2013
A universal client-based identity management tool?
Royal Holloway has announced that their Information Systems Security Group (ISSG, as it is widely known) has launched new technology to protect against password theft and phishing attacks. The technology is dubbed Uni-IDM but the only real information about it is provided through a link to a paper on one of the author's personal web site. However, the paper, by Chris Mitchell and Haitham Al-Sinani, does seem to have been peer reviewed, having been published at EuroPKI 2011. In an interview on slashdot, "Digital IDs Designed to be More Secure Than Passwords", Professor Mitchell is reported to be aiming to develop an open source prototype, though he offered no schedule for when that might happen.
Let's hope it's soon. The rationale for the work looks spot on - it does not involve proposing any new cryptographic protocols or inrastructures, but wants to make existing systems resistant to phishing, as well as privacy-enhancing through an explicit user consent procedure. They propose 'IDSpace' as an architecture for a client-based ID management tool that operates in conjunction with a client web browser. The paper is worth a read if you are interested in ID management.
Let's hope it's soon. The rationale for the work looks spot on - it does not involve proposing any new cryptographic protocols or inrastructures, but wants to make existing systems resistant to phishing, as well as privacy-enhancing through an explicit user consent procedure. They propose 'IDSpace' as an architecture for a client-based ID management tool that operates in conjunction with a client web browser. The paper is worth a read if you are interested in ID management.
Wednesday, 7 August 2013
APT fighter FireEye files for $175M IPO
FireEye, a Californian company that was started up in 2004 by a former Sun Microsystems engineer, has raised around $100 million from venture firms, including $50 million earlier this year. Its SEC filing reveals that it has more than 900 employees. It seems quite rare to see an IPO for a cyber security company, especially one that is 9 years old. I think FireEye have hit the big time with their focus on Advanced Persistent Threats. The fight against APTs required a radical re-think of optimal security measures.
Tuesday, 30 July 2013
This Month's Cyber Security Investments and Acquisitions
Acquisitions, and several start-ups raising significant funds - here are the ones I came across this month:
'MobileSpaces' raises $8.6m for Enterprise security for mobiles
Friday, 14 June 2013
Accumuli accumulates another cyber security company
Accumuli, a serial acquirer of early stage cyber security companies, has announced another UK acquisition, Cambridge-based Signify Solution. Signify is a managed service provider of hosted two factor authentication solutions.
Accumuli announces acquisition of Signify Solutions
Also see:
Signify win 'Best Remote Access Security' at SC Awards 2013
Accumuli announces acquisition of Signify Solutions
Also see:
Signify win 'Best Remote Access Security' at SC Awards 2013
Tuesday, 21 May 2013
Vasco acquires Cronto for secure online transactions
There's a coincidence! In my post before last I commented on the release by Cronto of a new system to combat online banking fraud. Barely a month later and Cronto, a Cambridge University spin-out, has been acquired by Vasco.
Friday, 3 May 2013
Cassidian Acquires Another Network Security Company
It seems there is a race on. Which big defence company can hoover up the right cyber security SMBs?
Cassidian Acquires Cyber Expert Arkoon Network Security - Defense World:
Cassidian Acquires Cyber Expert Arkoon Network Security - Defense World:
Thursday, 18 April 2013
Cambridge uni spinout technology to combat online banking trojans
New system to combat online banking fraud: A security solution from a Cambridge University spin-out which protects against 'man-in-the-browser' trojans is being rolled-out by two German banks. The system works with the bank web site sending a 2d barcode-style picture that contains the transaction information. The user decodes it with a mobile app, or dedicated device, which also generates a transaction authentication code for the user to enter to confirm the transaction.
I've long thought that smartphones would be the route to secure transactions over the internet. Using them as out-of-band communication routes for passcodes, or validation checks, has security potential but means the user must have a mobile connection. Attacks on this mode have already been developed.
You can try out the CrontoSign technology by downloading the CrontoSign mobile app for iOS or Android devices and try it with a demo account at www.crontosign.com.
I've long thought that smartphones would be the route to secure transactions over the internet. Using them as out-of-band communication routes for passcodes, or validation checks, has security potential but means the user must have a mobile connection. Attacks on this mode have already been developed.
You can try out the CrontoSign technology by downloading the CrontoSign mobile app for iOS or Android devices and try it with a demo account at www.crontosign.com.
Friday, 12 April 2013
Inside Adastral: BT's Belgium-sized broadband boffinry base
An interesting report from 'The Register' about BT's Adastral Park - where our security futures practice, in BT Research and Technology, is based. BT is working on plans to create 2,000 new jobs and provision for up to 2,000 homes by 2025, by opening up areas of Adastral Park as a science campus. The idea is to create a Suffolk research centre - a regenerated research and development facility that encourages the growth of an ICT cluster in Suffolk.
Wednesday, 6 March 2013
Latest security investments benefit SMEs and parents
Spanish startup, Qustodio, raises $1m to allow parents to monitor Facebook chats and searches, as well as view browsing histories and which applications have been opened in a given session on their childrens devices. There is one dashboard for parents to control all devices, which may include tablets, smartphones, and home computers per child.
And Quorum pulls in $11M to help small businesses recover from hardware failure.
And Quorum pulls in $11M to help small businesses recover from hardware failure.
Saturday, 2 March 2013
HyTrust Wins Major Patents For Automated Cloud Security And Virtual Infrastructure Management
HyTrust Awarded Patents For Automated Cloud Security And Virtual Infrastructure Management: Patents relate to automated risk mitigation and compliance in virtualized infrastructure, and the adoption of multi-tenant clouds. I see a battle looming over cloud patents - everyone wants to carve out a piece of the action.
Wednesday, 27 February 2013
Remotium Wins Most Innovative Security Company at RSA Conference
Startup Remotium was named the Most Innovative Company at the start of the RSA Conference on Monday. Unsurprisingly it's a security technology for mobiles addressing the bring-your-own-device (BYOD) trend. It runs mobile applications on public or private clouds, and streams the visualization elements to the device so that enterprise data is never stored on it. Return of the thin-client?
The company has apparently not yet raised any venture funding.
The company has apparently not yet raised any venture funding.
Thursday, 21 February 2013
Startup Red Balloon Security to Protect Printers and Other Devices
The MIT review reports on a startup aiming to protect printers, phones, and other devices from hackers. It will announce the first device running its defensive code this week. This is an important development. Embedded devices are typically poorly protected, run legacy software and are rarely designed to be patched. They are inviting targets for advanced persistent threats, as we saw with Stuxnet.
Tuesday, 12 February 2013
Nok Nok! Who's there? No more passwords!
Yet another startup, Nok Nok Labs, is hoping to sway users away from insecure passwords. It has developed a security protocol that asks end users to substitute stronger authentication tools such as fingerprints and voice recognition, for usernames and passwords.
Named after the classic knock-knock joke, Nok Nok Labs' CEO was a founder of well respected encryption company PGP. Nok Nok has apparently taken $15 million in venture capital.
Named after the classic knock-knock joke, Nok Nok Labs' CEO was a founder of well respected encryption company PGP. Nok Nok has apparently taken $15 million in venture capital.
Monday, 21 January 2013
New approach to CAPTCHA - with ads!
Minteye, an Israeli start-up has come up with a new form of CAPTCHA - those annoying squiggly alphanumeric patterns that supposedly allow a web site to be sure that the user is human. What's more it has a business model attached to it. Minteye's variant is known as SLIDING CAPTCHA. The user adjusts a slider until a distorted image looks like something recognisable. The business angle is to include adverts in the human resolved image. Whether it is taken up will probably depend a lot on how well it can discriminate the human user but sometimes a good business model will trump security in the market. However, only last week it seems a short Python script was concocted to defeat it. But these things can never be perfect. And if a machine ever passes the Turing test how can CAPTCHAs hope to work?
Friday, 11 January 2013
10 Signs You’ve Been Working In Information Security Too Long
10 Signs You’ve Been Working In Information Security Too Long
e.g.
When your mum calls you ask her three security questions to verify her identity;
Your pet’s name consists of at least 20 characters, and contains a mix of numbers, uppercase letters, and at least one special character;
Sometimes you can’t understand your own thoughts because they are encrypted.
You get the idea!
e.g.
When your mum calls you ask her three security questions to verify her identity;
Your pet’s name consists of at least 20 characters, and contains a mix of numbers, uppercase letters, and at least one special character;
Sometimes you can’t understand your own thoughts because they are encrypted.
You get the idea!
Wednesday, 9 January 2013
12 Must-Watch Security Startups for 2013 from cio.com
12 Must-Watch Security Startups for 2013 - an interesting selection of mainly cloud-based security and security monitoring technologies. Some, although still in stealth mode, have already picked up significant investment.
Subscribe to:
Posts (Atom)