| Date | Title | Description |
| 31.01.2025 | 5 Key Insights from Gaurav Rajendra Kataria on Data Infrastructure | Created by Carl Williams
Updated: Jan 31 2025, 21:11 PM EST
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard |
| 27.01.2025 | 3 Expert Tips for Leveraging Technology in Finance Operations Success in modern business hinges on a product’s ability to transform complicated processes into competitive advantages. For organizations... | Success in modern business hinges on a product’s ability to transform complicated processes into competitive advantages. For organizations trying to thrive in global markets, recent growth in financial technology has led to a complete reima... |
| 30.09.2024 | 50 терминов системного дизайна, которые должен знать каждый разработчик | 1. Масштабируемость / Scalability
Масштабируемость — это способность системы поддерживать возросшую нагрузку путем добавления дополнительных ресурсов
Примером является добавление дополнительных серверов для обработки увеличившегося веб-траф... |
| 25.03.2024 | Снова про выбор DLP-системы и нужен ли он (выбор) | Вводное слово
Уважаемый читатель, добрый день!
Для меня публикация статьи на Хабре было закрытием гештальта.
Поэтому решил написать третью статью - и баста (данная статья под номером 3).
Выбрал для себя написать про DLP-системы. Почему? Мне... |
| 12.05.2023 | What is Russia’s Snake malware, and why is it so dangerous? | Like most people, I check my e-mails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox.
But yesterday brought something different and deeply disturbing. I noticed an alert from the Americ... |
| 17.11.2022 | What is software as a service? | Image: AndSus/Adobe Stock
Software as a service is a system of offering applications as services over the internet. Instead of deploying and managing software, users simply access them through the internet, freeing them from the complexitie... |
| 06.08.2022 | Web3 and shifts in the attention economy | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
There has been a fundamental shift in the source of value within our economy.
In previous models, the source was labor.... |
| 28.07.2022 | Singapore police issues warning to DealStreetAsia’s COO | Premium Content
It takes our newsroom weeks - if not months - to investigate and produce stories for our premium content. You can’t find them anywhere else.
Shadine Taufik · 28 Jul 2022 · 6 min readSingapore police issues warning to DealStr... |
| 08.07.2022 | Real-world evidence must not become evidence for abortion-related prosecution | The Supreme Court’s decision to overturn federal protection for abortion changed in an instant how many people think about pregnancy. But it is also changing how health systems need to think about their current and future sharing and moneti... |
| 11.05.2022 | Concentric AI to autonomously secure business-critical data with $14.5M series A funding | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Concentric AI, a provider of intelligent AI-based... |
| 09.05.2022 | Chasing Invisible Adversaries | Chief technologist at CyberRes, a Micro Focus line of business, and emerging tech enthusiast who enables growth through digital strategy. |
| 20.03.2022 | Standard virtual workspace security is improving but still not enough | The COVID-19 pandemic sparked a shift towards work-from-home or telecommuting arrangements, which many companies are saying they are likely to retain even after the pandemic. This new way of working or doing business has raised the demand f... |
| 13.02.2022 | Modern mentorships: Fixing the cybersecurity skills gap | With job vacancies currently outweighing the number of people available to fill them, a career in cybersecurity offers almost limitless opportunities. The 2021 Cybersecurity Workforce Study from (ISC)² estimated that there were 4.19 million... |
| 03.02.2022 | Redcentric : Credential Stuffing – what it means, and how it affects your business | Did you know that many people still use easy to guess passwords, as well as the same password repeatedly?
A startling 61 percent of people admit to using the same password across multiple websites.
As a result, many accounts are vulnerable ... |
| 14.12.2021 | European Fraud Predictions 20221: Vaccine Scams to Deep Fakes | 2021 saw the world settling into a new normal with heightened expectations of digital experiences. But European fraud and financial crime have continued to evolve. As we move forward into 2022, we are seeing the first signs of some interest... |
| 09.11.2021 | Digital driver’s licenses: Are they secure enough for us to trust? | In 2016, Gemalto, a subsidiary of The Thales Group, received a federal grant to fund pilot projects in four states to test digital driver’s licenses. This mockup is from the pilot project.
Image: Thales Group
When a bartender checks your ID... |
| 04.11.2021 | Lock Down High-Performance Computing Security Before It’s Too Late | Tom Shea is President and CEO at Panasas. He has over 20 years of success delivering transformational storage technologies. |
| 26.10.2021 | How We Can Address The Absence Of Individual Cybersecurity Measures In The White House Summit | Hari Ravichandran is the CEO and Founder of Aura™, a leading provider of comprehensive digital security solutions for consumers. |
| 18.10.2021 | By identifying and halting incoming cyberattacks, threat intelligence can give companies – and their data – the upper hand | Assessing potential cyberattacks, or threat intelligence, is important to defend against breaches. Threat-intel platforms are available in various structures, including commercial and boutique feeds. Some customized feeds can be specific to... |
| 05.10.2021 | Threat hunting on a budget -- it's not as hard as you think… | With recent figures suggesting that global losses from cybercrime now total over $1 trillion, an effective threat hunting program has become essential to every business’s data security -- and long-term future. Establishing one from scratch ... |
| 30.09.2021 | Frontier IP : CamGraPhIC raises £1.6 million for high-speed, low-energy graphene photonics | 30/9/2021
CamGraPhIC has raised £1.6 million through an equity funding round from existing and new investors.
The fundraising values University of Cambridge spin out CamGraPhIC at £5.6 million pre-money. It brings total funds raised by the ... |
| 20.09.2021 | September is for raising awareness of insider threats | If you haven't been paying attention you may not have noticed that September is Insider Threat Awareness month, with the aim of educating individuals and organizations on the dangers of insider threats and the forms they can take.
Almost ha... |
| 31.08.2021 | Digital Guardian expands enterprise data protection platform to better secure new hybrid workforce | Digital Guardian expands enterprise data protection platform to better secure new hybrid workforce
Digital Guardian, a provider of software for data loss prevention (DLP) and managed detection and response (MDR), has made enhancements to it... |
| 20.08.2021 | 70 Million AT&T Personal Data Leakage: Here are Your Details Could Have Been Sold To Hackers | Griffin Davis , Tech Times 20 August 2021, 03:08 pm
Around 70 million AT&T customer personal data might have been leaked and sold to hackers. This is currently a serious issue since the telecommunication company has more millions of cus... |
| 20.08.2021 | 5 Steps To Help Protect Your Startup From A Cyber Attack | Cybersecurity is important to all businessesgetty |
| 30.07.2021 | ICYMI: Our Channel News Roundup for the Week of July 26th | The Tokyo 2020 +1 Olympics are all over your TV, at least on every channel connected to NBC, and who knew there were that many NBC channels? All the better to watch the grueling, sweaty, heart-pumping, extreme exertion of those rugged athle... |
| 19.07.2021 | Okta : What Is Two-Factor Authentication (2FA)? | Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two ... |
| 08.07.2021 | Five Risk Assessments Where Automotive Giants Need To Improve To Compete With Startups | The automotive industry stands at the precipice of several market and product shifts with startups ... [+] threatening to steal their business if risks are not properly understood.getty |
| 30.06.2021 | Sumo Logic : The Role of Threat Hunting in Modern Security | Security and IT teams may be loathe to admit it, but security has historically been mostly a reactive affair. Security engineers monitored for threats and responded when they detected one. They may have also taken steps to harden their syst... |
| 16.06.2021 | Best practices for protecting patient information | Patient data is vital to operations and a valuable resource, making it attractive to cybercriminals
We live in an increasingly data-rich society. In many ways, this can be a very useful thing for the medical industry. It allows professional... |
| 02.06.2021 | 7 tactics for boosting the security of your APIs | Cyber security lock. Security computer Data Internet protection with lock, key on microscheme chip. Hacker attack and data breach, information leak concept. (Cyber security lock. Security computer Data Internet protection with lock, key on ... |
| 30.04.2021 | Many Highly Regulated Companies Have Made The Leap To The Cloud — You Can, Too | VP of Cloud Services at Unisys. |
| 27.04.2021 | Why Senior Management Needs to Make Cloud Backup a Priority | At work and at home, backup is critical. From making photocopies of significant documents to digitising old family photos, relying on hard drives to replicating servers, we all know that it’s important to have multiple copies of the informa... |
| 26.04.2021 | Why senior management needs to make cloud backup a priority | At work and at home, backup is critical. From making photocopies of significant documents to digitizing old family photos, relying on hard drives to replicating servers, we all know that it’s important to have multiple copies of the informa... |
| 31.03.2021 | How To Secure Permissions And Avoid Internal Data Theft | CEO at DefendX, overseeing Secure Data Management- File Discovery, Compliance and Mobility for our customers globally. |
| 24.03.2021 | You Rushed To The Cloud—Now It's Time To Assess And Address Cloud Security | Anupam Sahai is Vice President and Cloud CTO at Unisys. He leads the cloud business and product/tech strategy for the company. |
| 18.03.2021 | Cybersecurity ratings platform SecurityScorecard raises $180M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
SecurityScorecard, a cybersecurity rating and ris... |
| 18.03.2021 | Cybersecurity ratings platform SecurityScorecard raises $180M | Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more.
SecurityScorecard, a cybersecurity rating and risk-monitoring platform, today announced that it has raised $180 million in a series E round of fundin... |
| 19.02.2021 | Why Global Internet Security Standards Can Provide A Foundation For Assurance And Accountability | Andy is CSO for Huawei Technologies USA, overseeing Huawei’s US cyber assurance program. |
| 15.02.2021 | How Tech is Shaping the Future of Finance | February 15, 2021 4 min read
Opinions expressed by Entrepreneur contributors are their own.
Technology and finance have always been intertwined, from the invention of the abacus to make financial calculations easier to the mammoth supercomp... |
| 08.02.2021 | The Cybersecurity Challenges Of A New Presidential Administration | Nick is the Chief Security Fanatic of Security Fanatics, CIO, keynote speaker, author & radio show host. He loves all things Cybersecurity. |
| 19.01.2021 | Protecting Your Business From Insider Threats | CEO at DefendX, overseeing Secure Data Management- File Discovery, Compliance and Mobility for our customers globally. |
| 07.01.2021 | How to be cyber-resilient to head off cybersecurity disasters | Image: solarseven, Getty Images/iStockphoto
Who’d have thought, “It’s no longer a question of if, but when” would become a time-worn cliche on cybercrime? But it has. Financial losses, scarred reputations, and customer mistrust seem to indi... |
| 04.01.2021 | Data Of 10 Cr Digital Payments Transactions Leaked After Attack On Juspay’s Server | In what is seemingly the biggest data leak in India’s history in terms of the number of users affected, the data of 10 Cr cardholders has been leaked on the dark web.
The leaked data, which is in the form of a data dump, appears to have bee... |
| 03.01.2021 | Exclusive: India’s Biggest Data Leak? Info Of 10 Cr Cardholders Leaked From Juspay’s Server | In what is seemingly the biggest data leak in India’s history in terms of the number of users affected, the data of 10 Cr cardholders has been leaked on the dark web.
The leaked data, which is in the form of a data dump, appears to have bee... |
| 22.12.2020 | The fallout from the SolarWinds hack that infiltrated the US Treasury and Homeland Security will get worse before it gets better | SolarWinds headquarters in Austin, Texas. Sergio Flores/Reuters
US government agencies and private organisations have been the targets of a cyberattack that was only just uncovered this month.
A group of hackers believed to be associated wi... |
| 22.12.2020 | The fallout from the SolarWinds hack that infiltrated the US Treasury and Homeland Security will get worse before it gets better | US government agencies and private organizations have been the targets of a cyberattack that was only just uncovered this month.
A group of hackers believed to be associated with the Russian intelligence agency SVR infiltrated a SolarWinds ... |
| 25.11.2020 | SaaS Apps: Understanding The Business, Security And Compliance Risks | CEO and Founder at Spin Technology, a cloud data protection company based in Palo Alto. |
| 23.11.2020 | Privacy, Power, Fiscal Policy, the Poor: 4 Reasons to Worry About CBDCs | It has become clear by now that central bank digital currencies, or CBDCs, will be in our future and the technology will fundamentally change the use of money and the economic system as a whole.
The world’s biggest economies and their centr... |
| 18.11.2020 | Will Quotas For Women Lead To Broader Diversity? | When Kamala Harris took the stage as Vice President-elect, it revealed how our leaders serve as our role models, for better or worse. Harris’s presence made it clear how much we need women, and indeed, women of color, in leadership. |
| 30.10.2020 | From Voting To Social Media: What Does The Future Hold For Digital Identity On The Blockchain | The future of digital identity?getty |
| 26.08.2020 | Stem Helps Musicians Get Paid. It Just Scored a Big Payday Itself. | Stem, an L.A. music-fintech company that counts Zac Brown Band, Foster the People and Toro Y Moi as clients, announced a $10 million raise.
The pandemic has hurt the music industry but has made Stem's tools and artist loan program 'more rel... |
| 03.08.2020 | Eleven cyber security tips for small businesses | As Australians continue to work from home, business leaders must take a long-term approach to their cyber security strategy.
There are a number of cyber security tips for small businesses making the rounds that you should consider in order ... |
| 23.06.2020 | Dodge ransomware – learn to spot a phish | Douw Gerber, Business Development Manager at South Africa-based managed IT security services company, Securicom
More companies are falling victim to ransomware attacks, with a large South African healthcare group becoming a target last week... |
| 28.05.2020 | Massive amounts of corporate data now stored on employee USB devices | There has been a 123 percent increase in the volume of data downloaded to USB devices by employees since working from home has become widespread due to coronavirus.
What's more, according to a report from SaaS data protection company Digita... |
| 03.04.2020 | Why is the Holistic Cybersecurity Approach Important? | Staff Reporter, Tech Times 03 April 2020, 10:04 am
(Photo : pixabay)
Regardless of what business you are in, holistic cybersecurity is deemed to be an integral part of a company's digitalization. With cyber-attacks increasing at a rapid pac... |
| 30.01.2020 | Containing The Threat From Within: The Growing Risk Of Insider Attacks | Photo:Getty |
| 28.01.2020 | Data Privacy Day 2020 – Are You Cyber Safe? | Data Privacy Day falls on Tuesday, January 28th, and it marks a neat opportunity to consider your own digital safety. After all, this is a day created to raise awareness of data security online, and used to promote best practice for privacy... |
| 08.01.2020 | 5 reasons why supply chain security must be on your agenda | Presented by Intel
How do you know that the critical parts inside your servers and devices are not poor quality, ready to fail at a crucial moment? Or, worse, hide malware with nefarious intentions like key-stroke logging, data theft, or sa... |
| 19.12.2019 | Organizations search for tougher cybersecurity measures as APTs run rampant | Advanced persistent threats (APTs) have become aggressive in their attempts to breach organizations’ networks. These malicious actors look to gain unauthorized access to infrastructures for prolonged periods of time so that they can perform... |
| 26.11.2019 | How cyberinsurance works to protect companies in case of a security breach | Image: wildpixel, Getty Images/iStockphoto
Insurance is a way of life for businesses, as it’s essential to protect company property and personnel. It can also help alleviate the pain of cybersecurity incidents, which can cost anywhere from ... |
| 11.11.2019 | Hackers Dissect 'Mr. Robot' Season 4 Episode 6: ‘Not Acceptable’ | Episode 6 of Mr. Robot’s final season was pretty heavy, filled with coercion, kidnapping, and threats of violence. We discussed [SPOILERS, obvs] physical security, interrogation, vishing, ZRTP keywords, wiretapping, wiping phone data and mo... |
| 08.09.2019 | HackerOne just closed a new round of funding that brings its total funding to $110 million | HackerOne, the seven-year-old, San Francisco-based company that mediates between hackers and companies interested in testing their online vulnerabilities, has raised $36.4 million in Series D funding that brings the company’s total funding ... |
| 18.05.2019 | How To Prevent Data Breaches In The Cloud | Ernest Hamilton, Tech Times 18 May 2019, 11:05 am
The cloud is the newest frontier of the digital space, but with every new frontier comes new and unforeseen dangers. Businesses that depend on the cloud for storing their data have run into ... |
| 17.05.2019 | Why Canadian Businesses Need to Invest in Cybersecurity Right Now | Cybercriminals definitely have Canada on their minds. They have seen that Canadian businesses don’t really have much protection against cybersecurity threats. Cybercriminals have targeted them multiple times, and a lot of businesses still d... |
| 25.04.2019 | Term Sheet April 25, Uber and Income Inequality, IPO Taxes, Deutsche Bank’s Merger Death, | MERGER DEATH
Hello Term Sheet readers—Lucinda here until Polina’s return Monday. In the meantime, send deals, thoughts, random musings on life and a timeline for the end of driver’s licenses to lucinda.shen@fortune.com.
Paid Content Securin... |
| 24.04.2019 | Digital Guardian Raises $30M in Financing | Digital Guardian, a Waltham, Mass.-based guardian data protection platform provider, received $30 million in additional financing.
LLR Partners was the lead in the round with participation from previous investors.
The company intends to use... |
| 24.04.2019 | Daily funding roundup - April 24th, 2019 | Motimatic raised $4M; Vital secured $5.2M; Credly closed $11.1M; Vue.ai landed $17M
Chili Piper: Chili Piper increased conversion rates on inbound leads by embedding an intelligent form scheduler alongside their marketing automation. Chili ... |
| 24.04.2019 | Cybersecurity Firm Digital Guardian Gets $30M Boost, Hires Execs | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Digital Guardian is taking in a chunk of capital and adding a slate of new executives to push its cybersecurity software, amid businesses’ renewed concerns over digital attack... |
| 24.04.2019 | Digital Guardian Raises $30 Million | WALTHAM, Mass.--(BUSINESS WIRE)--Digital Guardian today announced it has received $30 million in additional financing. LLR Partners, a leading private equity firm and existing investor, was the lead on the round and previous investors also ... |
| 24.04.2019 | LLR Partners Leads $30M Financing for Digital Guardian | Digital Guardian today announced it has received $30 million in additional financing. LLR Partners, a leading private equity firm and existing investor, was the lead on the round and previous investors also participated. These investors rec... |
| 19.02.2019 | Digital Guardian Taps CA Technologies Cyber Exec as Its New CEO | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Digital Guardian, a cybersecurity business focused on data loss prevention, has tapped a CA Technologies executive to lead the Waltham, MA-based company several months after t... |
| 09.08.2018 | Customer Data Management – A Crucial Step to Increase Your Business | Computers continue growing smarter and people continually spend more time online interacting with them. As such, there’s more data available out there than ever before. Regardless of your position in the business world, you understand the r... |
| 14.08.2017 | Don't dismiss insider threats when assessing security | When we think of a cyberthreat, we often imagine a nation state hacking group, or a virus trying to work its way into our company network. After all the media is full of depictions of incidents of this very nature -- how many times has Nort... |
| 27.07.2017 | Top 100 Cybersecurity Startups in Q2 of 2017 | With Black Hat in full swing and global cyber attacks making headlines more often than the Kardashians, the cybersecurity discussion is trending up in the business world and beyond. Large companies, small startups, and overly trusting indiv... |
| 23.05.2017 | How small businesses can protect against data breaches from within | By Craig Horne, University of Melbourne
As we become more connected and companies hold more data, breaches are increasing, with more than 4,000 reported in 2016 alone. A statistical analysis of breaches in the United States found that 85% w... |
| 18.05.2017 | With Ransomware Concerns Fresh, Cybersecurity Firms Tap VC Funding | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
While a wave of cyber attacks like the coordinated “WannaCry” virus may be bad for business, it’s no secret that it means good business promotion for the cybersecurity industr... |
| 14.04.2017 | GDPR and what it means for businesses | The EU's General Data Protection Regulation (GDPR) comes into force in just over a year's time, but what impact will it have on business data protection efforts?
Advertisement
GDPR is one of the toughest pieces of data protection legislatio... |
| 10.01.2017 | Insiders or outsiders, which is the greater threat? | Historically, the idea of a hacker has always conjured up images of the outsider trying to gain access to government or corporate systems.
Advertisement
But in recent years it's become clear that insiders can present just as big a threat, w... |
| 07.09.2016 | New Cybersecurity Alliance Continues Trend of Industry Collaboration | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
For the cybersecurity industry, 2016 is shaping up to be the year of alliances.
There have been a series of tie-ups, as security-tech companies try to boost their businesses a... |
| 05.04.2016 | Mossack Fonseca hack exposes shady financial practices of world's rich and famous | One of the largest data breaches in history has resulted in the leak of eleven million confidential documents -- around 2.6TB of data -- from financial firm Mossack Fonseca, one of the most secretive companies in the world.
According to the... |
| 31.03.2016 | Meeting cybersecurity challenges through gamification | Ben Dickson Contributor
Ben Dickson is a software engineer and the founder of TechTalks.
More posts by this contributor
Monetizing computing resources on the blockchain
Unlocking the potential of eye tracking technology
When it comes to cyb... |
| 25.03.2016 | 9 Cost-Effective and Critical Security Tips for Startups | Target. Home Depot. Sony. What do they all have in common other than falling victim to major security breaches? They aren’t startups.
When big names fall victim to data breaches, its big news, making smaller companies believe they aren’t li... |
| 02.03.2016 | What makes a typical information security chief? | Major data breaches continue to highlight how essential it is for businesses to secure their systems, and as a result many organizations are looking to recruit information security officers.
Advertisement
But what should they be looking for... |
| 11.01.2016 | 7 Essential Steps for Safely Moving Patient Data to the Cloud | Editor’s Note: Salo Fajer is the Chief Technology Officer at Digital Guardian. He is responsible for driving the company’s strategic vision and core innovation efforts while also overseeing product management, product marketing, and product... |
| 25.12.2015 | 5 Tips for Keeping Your Data Secure in the Cloud | For business owners, the thought of sensitive customer information or corporate data being exploited is horrifying. Worse, we’ve all seen it happen. Celebrities, corporations, and individuals have all had sensitive data stolen from the clou... |
| 16.12.2015 | Digital Guardian Secures $66M in VC Funding | Digital Guardian, a Waltham, MA-based data protection platform purpose built to stop data theft, secured $66m in financing.
Backers included previous investors GE Pension Trust (advised by GE Asset Management), Fairhaven Capital Partners, L... |
| 16.12.2015 | Daily funding roundup - December 16, 2015 | Slack revealed $80M fund; Digital Guardian bagged $66M; Springboard raised $1.7M
Education technology company Springboard (formerly known as SlideRule) today announced that it has raised $1.7 million in seed funding from a long list of inve... |
| 16.12.2015 | Digital Guardian raises $66M for data protection | Following revenue growth, new customers, and hiring, data security company doubles its warchest
Whatever a certain unimaginably uninformed Republican presidential candidate happens to think about digital encryption, there's one thing most o... |
| 16.12.2015 | Digital Guardian Raises $66M Amid Big Revenue Growth, Plots IPO | Boston’s next big winner in cybersecurity could be a company that’s not exactly new to the game. Waltham-based Digital Guardian on Wednesday announced $66 million in new funding—easily the firm’s largest round since it was founded as Verdas... |
| 16.12.2015 | Digital Guardian Grabs $66M, Looks to Prevent Data Loss | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
The story of the year in Boston tech might be the growth of the cybersecurity sector. Today, an established player in data protection says it’s adding a big funding round to k... |
| 16.12.2015 | Cybersecurity Firm Digital Guardian Raises $66M | It seems like every time you check the headlines a new company is getting its data stolen.
For the past 12 years Digital Guardian has been striving to help companies classify and protect data on their systems so that they can avoid being th... |
| 14.12.2015 | New Money: Octopus-Like Robotics Startup Raises $3M, TVision Gets $2.5M | Get a daily dose of Boston startup funding news in The Beat. Sign up here. New Money is BostInno's report on all the tech funding deals this week. Check back for updates with more new money.
Soft Robotics (Cambridge)
Amount: $3 million, acc... |
| 30.10.2015 | How your social media habits could be putting your security at risk | The biggest risk to your data or that of your company could stem from the way you use social media. Despite headline-hitting hacking attacks social media remains a favorite tool of cyber criminals.
Advertisement
Data protection specialist D... |
| 29.10.2015 | Are You Helping Criminals Take Your Data? | From posting baby photos to reactions about tv shows, social media is the best way to communicate to our friends. But what you post online may be aiding scammers steal your information. With close to half of all Americans’ private informati... |
| 02.06.2015 | Digital Guardian Appoints New Vice President & General Manager of EMEA & India | Luke Brown brings proven international track record of success to Digital Guardian as it continues to expand its operations in both EMEA and India
LONDON, UK: June 2, 2015 – Digital Guardian, the only endpoint security platform purpose buil... |
| 17.10.2014 | Digital Guardian Acquires Armor5 | Digital Guardian, a provider of a security solution to protect data from insider and outsider threats with a single agent, acquired Armor5, a Santa Clara, Calif.-based application and endpoint security provider.
The amount of the transactio... |
| 16.10.2014 | Boston Tech Tidbits: Digital Guardian, MassChallenge, Nara, Quantopian | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Lots going on in the Boston tech startup scene this week:
—Accelerator program MassChallenge announced its top 26 startups that are competing for prize money. The awards cerem... |
| 08.08.2014 | Boston Tech Roundup: RedPoint, Verdasys, Directr | Share Share on Facebook Share on Twitter LinkedIn Email Reprints
Here’s a few deals to catch up on as we wrap up another summer week around the Boston-area technology sector:
—RedPoint Global, a Wellesley Hills, MA-based software company, h... |
| 05.08.2014 | Funding Daily: Big investments for security and analytics startups | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Here’s our roundup of all of the notable funding ... |