Tag: startup
-
Last chance alert: Founder and Investor Bundle savings for TechCrunch Disrupt 2025 ends tomorrow
Founder and Investor Bundle savings for TechCrunch Disrupt 2025 end tomorrow, October 3. Groups of 49 founders save 15% and investors save 20%. Access top VCs, pitch-ready startups, and hands-on sessions. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/02/last-chance-alert-founder-and-investor-bundle-savings-for-techcrunch-disrupt-2025-ends-tomorrow/
-
Tonic.ai + Microsoft: Accelerating AI adoption with privacy-compliant synthetic data
Tonic.ai is thrilled to join the Microsoft for Startups Pegasus Program. We’re bringing our privacy-compliant synthetic data solutions to Microsoft Azure customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/tonic-ai-microsoft-accelerating-ai-adoption-with-privacy-compliant-synthetic-data/
-
Tonic.ai + Microsoft: Accelerating AI adoption with privacy-compliant synthetic data
Tonic.ai is thrilled to join the Microsoft for Startups Pegasus Program. We’re bringing our privacy-compliant synthetic data solutions to Microsoft Azure customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/tonic-ai-microsoft-accelerating-ai-adoption-with-privacy-compliant-synthetic-data/
-
Databricks enters the cybersecurity arena with an AI-driven platform
A crowded field of AI Security Platforms: Databricks’ latest move puts it in competition with established security players who’ve been leaning heavily on AI-driven analytics, including Splunk (now part of Cisco), Microsoft Sentinel, Google Chronicle, and startups like Securonix. Each offers some flavors of unifying data streams, layering AI detection, and reducing analyst fatigue.For Databricks,…
-
Can Shadow AI Risks Be Stopped?
Agentic AI has introduced abundant shadow artificial intelligence (AI) risks. Cybersecurity startup Entro Security extends its platform to help enterprises combat the growing issue. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/can-shadow-ai-risks-be-stopped
-
How to restructure your security program to modernize defense
Restructuring the security program when technology and skills change: When revamping the security programs, CISOs can have in mind Venables’ four-phase framework, which is flexible enough to fit almost any organization. Companies can start where they are, make the changes they want, and then return to complete the remaining tasks.Restructuring the security program should be…
-
Wiz chief technologist Ami Luttwak on how AI is transforming cyberattacks
Ami Luttwak, CTO of Wiz, breaks down how AI is changing cybersecurity, why startups shouldn’t write a single line of code before thinking about security, and opportunities for upstarts in the industry. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/28/wiz-chief-technologist-ami-luttwak-on-how-ai-is-transforming-cyberattacks/
-
TruSources to show off its on-device identity-checking tech at TechCrunch Disrupt 2025
Age-verification laws are a privacy and security nightmare. This startup performs age checks on-device, without users having to upload their IDs to the internet. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/26/trusources-to-show-off-its-on-device-identity-checking-tech-at-techcrunch-disrupt-2025/
-
Hackers Use GitHub Notifications to Impersonate Y Combinator and Steal Wallet Funds
A recent wave of sophisticated phishing attacks has targeted developers and startups by impersonating Y Combinator through GitHub notifications. Victims are being tricked into believing they’ve been selected for startup funding, only to face financial theft via fake verification schemes. This incident spotlights the new tactics phishers use to exploit trusted online platforms and reputable…
-
Hackers Use GitHub Notifications to Impersonate Y Combinator and Steal Wallet Funds
A recent wave of sophisticated phishing attacks has targeted developers and startups by impersonating Y Combinator through GitHub notifications. Victims are being tricked into believing they’ve been selected for startup funding, only to face financial theft via fake verification schemes. This incident spotlights the new tactics phishers use to exploit trusted online platforms and reputable…
-
Content Signals: Cloudflare gibt Publishern mehr Kontrolle über ihre Inhalte
Die Entscheidung über die kommerzielle Nutzung von Daten muss bei den Betreiberinnen und Betreibern selbst liegen egal ob es sich um ein lokales Nachrichtenportal, ein KI-Start-up oder einen Online-Shop handelt. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/content-signals-cloudflare-gibt-publishern-mehr-kontrolle-ueber-ihre-inhalte/a42126/
-
AI coding assistants amplify deeper cybersecurity risks
Tags: access, ai, api, application-security, attack, authentication, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, data-breach, detection, fintech, flaw, governance, injection, leak, LLM, metric, open-source, programming, radius, risk, risk-management, service, software, startup, strategy, threat, tool, training, vulnerability‘Shadow’ engineers and vibe coding compound risks: Ashwin Mithra, global head of information security at continuous software development firm Cloudbees, notes that part of the problem is that non-technical teams are using AI to build apps, scripts, and dashboards.”These shadow engineers don’t realize they’re part of the software development life cycle, and often bypass critical…
-
Details About Chinese Surveillance and Propaganda Companies
Tags: business, china, data-breach, firewall, government, infrastructure, startup, strategy, technologyDetails from leaked documents: While people often look at China’s Great Firewall as a single, all-powerful government system unique to China, the actual process of developing and maintaining it works the same way as surveillance technology in the West. Geedge collaborates with academic institutions on research and development, adapts its business strategy to fit different…
-
The Complete Guide to Analyst Research Firms: How Innovative Companies Navigate the Landscape
90% of enterprise buyers consult analysts before purchasing. Yet most startups struggle with analyst relations. Here’s your complete roadmap to navigating Gartner, Forrester, and 20+ top research firms”, from a serial entrepreneur who’s been on both sides. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/the-complete-guide-to-analyst-research-firms-how-innovative-companies-navigate-the-landscape/
-
Irregular Secures $80M Series A to Combat AI Model Exploits
Startup Simulates Offensive and Defensive AI to Test and Thwart AI-Based Threats. Irregular secured $80 million in funding to turn its research into scalable security tools for businesses adopting AI. With growing offensive AI capabilities, the company is racing to productize simulations that detect vulnerabilities before attackers do. First seen on govinfosecurity.com Jump to article:…
-
CrowdStrike Buys Pangea for $260M to Guard Enterprise AI Use
Silicon Valley Startup Brings AI Agent and Prompt Injection Protections to Falcon. CrowdStrike plans to purchase Pangea to add native AI detection and response capabilities to its Falcon platform. The company says the acquisition will help secure AI models and users alike from preventing prompt injection to tracking agent activity across enterprise environments. First seen…
-
Irregular raises $80 million to secure frontier AI models
Irregular, the AI security startup, now has a valuation of $450 million, a source close to the deal told TechCrunch. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/17/irregular-raises-80-million-to-secure-frontier-ai-models/
-
Remedio Secures $65M to Tackle Patch and Vulnerability Gaps
Startup Plans Unified Remediation for Misconfigurations and Patching, Compliance. Remedio has landed $65 million in funding to develop tools that go beyond detection and automate secure remediation. CEO Tal Kollender says the goal is faster growth, a bigger U.S. sales footprint, and delivering a platform that closes the gap between risk visibility and action. First…
-
Check Point acquires Lakera to build a unified AI security stack
Tags: access, ai, api, attack, automation, cloud, compliance, control, cybersecurity, data, endpoint, government, infrastructure, injection, LLM, network, RedTeam, risk, saas, startup, supply-chain, tool, trainingClosing a critical gap: Experts call this acquisition significant and not merely adding just another tool to the stack. “This acquisition closes a real gap by adding AI-native runtime guardrails and continuous red teaming into Check Point’s stack,” said Amit Jaju, senior managing director at Ankura Consulting. “Customers can now secure LLMs and agents alongside…
-
CrowdStrike To Expand AI Security Portfolio With Deal To Acquire Pangea
CrowdStrike has reached an agreement to acquire Pangea, a startup that offers guardrails for GenAI-powered applications, the company announced Tuesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-to-expand-ai-security-portfolio-with-deal-to-acquire-pangea
-
Check Point To Buy AI Cybersecurity Startup Lakera To Boost Agentic AI Security
Check Point to acquire AI cybersecurity startup Lakera to boost AI security for enterprise customers around LLMs, AI agents and multimodal workflows, says CEO Nadav Zafrir. First seen on crn.com Jump to article: www.crn.com/news/security/2025/check-point-to-buy-ai-cybersecurity-startup-lakera-to-boost-agentic-ai-security
-
Seon Receives $80M to Grow Autonomous AML and KYC Platform
Series C Funding to Drive R&D, Fuel Vision for End-to-End Compliance Capabilities. Texas-based fraud detection startup Seon closed an $80 million Series C funding round to support its shift toward an all-in-one AML and KYC compliance platform powered by AI, as it pursues aggressive international expansion and deeper product integration. First seen on govinfosecurity.com Jump…
-
When is the Right Time to Hire a CISO?
Knowing when to hire a CISO is a challenging proposition one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited to: Relevance of regulatory requirements Size of the organization Complexity of operations Sensitivity of data handled or processed Desired risk…
-
Auth0 Pricing Explained (And Why Startups Call It a Growth Penalty)
Tags: startupDiscover why startups face the Auth0 “growth penalty.” Learn pricing mechanics, hidden costs, and affordable alternatives for scalable growth. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/auth0-pricing-explained-and-why-startups-call-it-a-growth-penalty/
-
What the Salesloft Drift breaches reveal about 4th-party risk
Tags: access, ai, api, attack, breach, control, data, data-breach, email, exploit, google, hacker, incident response, intelligence, monitoring, risk, risk-assessment, saas, soc, software, startup, supply-chain, technology, threat, tool, zero-trustFebruary 2024: SalesLoft acquires Drift, an AI-powered chatbot companyThe hidden legacy: Drift’s existing OAuth tokens to thousands of Salesforce and Google Workspace instances probably remained activeTime passes: Tokens and app permissions remain valid unless explicitly rotated or revoked.August 2025: Attackers abuse OAuth tokens associated with the Drift application to enumerate and exfiltrate Salesforce data; a…
-
Vibe coding? Meet vibe security
As AI evolves at breakneck speed, attackers are evolving right alongside it. Vibe coding, AI agents, and prompt-based attacks are opening enterprises up to new vulnerabilities daily. The pressure is on for cybersecurity tools to keep pace, and startups are seizing the moment. Few have grown as rapidly as Wiz, which Google is acquiring for…
-
Google’s former security leads raise $13M to fight email threats before they reach you
The startup is using real-time AI agents that inspect, analyze, and neutralize email threats. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/10/googles-former-security-leads-raise-13m-to-fight-email-threats-before-they-reach-you/
-
71% of CISOs hit with third-party security incident this year
Tags: access, ai, application-security, attack, backdoor, breach, ceo, cisa, ciso, cloud, compliance, control, credentials, cyber, cybersecurity, data, defense, exploit, incident response, intelligence, malicious, malware, open-source, penetration-testing, phishing, programming, pypi, resilience, risk, risk-management, sbom, security-incident, service, software, startup, supply-chain, threat, toolSoftware supply chain threats: The software supply chain is heavily reliant on code developed by third-party developers, something only likely to increase with the advent of AI.Brian Fox, co-founder and CTO of open-source software security vendor Sonatype, says that “enormously complex” software supply chains pose a growing threat.”Too many organizations have no idea what open-source…
-
71% of CISOs hit with third-party security incident this year
Tags: access, ai, application-security, attack, backdoor, breach, ceo, cisa, ciso, cloud, compliance, control, credentials, cyber, cybersecurity, data, defense, exploit, incident response, intelligence, malicious, malware, open-source, penetration-testing, phishing, programming, pypi, resilience, risk, risk-management, sbom, security-incident, service, software, startup, supply-chain, threat, toolSoftware supply chain threats: The software supply chain is heavily reliant on code developed by third-party developers, something only likely to increase with the advent of AI.Brian Fox, co-founder and CTO of open-source software security vendor Sonatype, says that “enormously complex” software supply chains pose a growing threat.”Too many organizations have no idea what open-source…
-
71% of CISOs hit with third-party security incident this year
Tags: access, ai, application-security, attack, backdoor, breach, ceo, cisa, ciso, cloud, compliance, control, credentials, cyber, cybersecurity, data, defense, exploit, incident response, intelligence, malicious, malware, open-source, penetration-testing, phishing, programming, pypi, resilience, risk, risk-management, sbom, security-incident, service, software, startup, supply-chain, threat, toolSoftware supply chain threats: The software supply chain is heavily reliant on code developed by third-party developers, something only likely to increase with the advent of AI.Brian Fox, co-founder and CTO of open-source software security vendor Sonatype, says that “enormously complex” software supply chains pose a growing threat.”Too many organizations have no idea what open-source…

