According to IBM, the average cost of a data breach is $4M but only 29% of businesses have a cybersecurity expert on their IT team. As businesses use more and more data and as employees use more devices (the average employee now uses 2.3 devices), the potential liability increases each day. Axonius’ cybersecurity asset management platform gives enterprises a full inventory of their assets and ensures that these devices are properly being secured. The platform takes a holistic approach by integrating into existing cybersecurity tools and workflows and ensuring that all devices being used (whether physical or virtual) are compliant with the company’s security protocols. Founded by former intelligence officers from the Israeli Defense Force, the platform solves the fragmentation problem found in enterprises when it comes to security. AlleyWatch caught up with CEO and Cofounder Dean Sysman to learn more about the complexities in managing sound cybersecurity policies throughout an enterprise, the company’s future plans, and latest round of funding from investors that include Stripes, Bessemer Venture Partners, OpenView, Lightspeed, and Vertex.
Privacy and Security
Chris Cunningham of C2 Ventures offers some predictions for what 2021 will bring to tech, covering AR, privacy, insurtech, and much, much more…
For too long online users have been too willing to hand over their personal data in exchange for using mobile services (e.g., Apple, Facebook, Amazon, Google, etc.). As these companies continue to expand their footprints, untethered by regulators, into every facet of their customer’s lives there is a growing revolt.
Recently, the Interior Department ordered the grounding of its drone fleet that was made in China or contained Chinese parts. This comes on the heels of similar actions taken by the Department of Homeland Security in May and the United States Army in 2017. While political pundits credit the ban to the Trump administration’s policy initiatives […]
With a 126 percent increase in stolen sensitive personal information, there is a growing population out there worried about all the people intent on hurting them.
I’ve narrowed digital policy development down to five things you absolutely must do to protect your business, your employees, and your customers.
Cybersecurity is an epic, ongoing battle in which the good guys are companies and consumers trying to be safe, and the bad guys are the evil hackers, criminals, and nation-state spies. The good guys are led into battle by Chief Information Security Officers (CISOs) and their teams. To stay ahead of the bad guys, companies […]
Abruptly, I enter the cab escaping the arctic weather to confront something worse than freezing rain – body odor. Luckily, another taxi pulled to the curb and I continued my journey to last Tuesday’s RobotLab forum on Cybersecurity & Machines. Moderating a panel at the new Global Cyber Center, with John Frankel of ffVC and Guy Franklin of SOSA, I […]
Covert Operations has long relied on a mix of the most current technology available, and the need for an “old-school,” hands-on approach. No covert operative worth his salt would rely entirely on technology, as opening up an operation to an easy hack is almost the first danger one is warned against in training. I ran […]
Who knew that the privacy of one’s personal information would become a variable? Our parents admonished us not to write anything in a letter or note to another that we would not be comfortable seeing on the front page of The Wall Street Journal. We were well schooled in the art of bifurcating our lives […]