AI, Supply Chain Are Fertile Areas for Cybersecurity Investment

The past year has been a busy one for startups, with investors re-evaluating their rules on what kind of companies to invest in and larger companies going shopping for innovative technologies.
Focusing on individual acquisitions or startup launches makes it easy to miss the investment trends.
Recent announcements from MACH37, an accelerator focused on innovation in cybersecurity, and DataTribe, a venture capital firm focused on cybersecurity startups, provide a glimpse of the areas in which investors are most interested in spending their money and time.
While Mach37 and DataTribe had different approaches in how they identified innovation in cybersecurity, they are both looking for companies and technologies capable of solving increasingly complex cybersecurity challenges.
Mach37 Plants the Seeds Mach37 focuses on scaling and market integration, because the goal is building up each startup's potential for long-term growth.
Many potential investors, early-adopting customers, and potential channel partners want to see how companies perform throughout an accelerator program before investing or partnering.
Startups benefit from mentorship opportunities, learn to develop sustainable business practices, and get help lining up customers.
Mach37 named a range of startups offering AI-powered SaaS platforms, intelligence-grade cloaking, and cybersecurity intelligence platforms to its cyber accelerator class of 2023.
DataTribe Grows the Seeds In contrast, DataTribe zeroes in on the seed stage, seeking more fundamental, ground-breaking shifts in cybersecurity and data science.
The venture capital firm recently announced the DataTribe Challenge, where seed-stage cybersecurity startups applied for the opportunity to win up to $2 million in seed capital.
The finalists were selected based on how they tackled areas such as secure logins and AI risk management.
The five finalists focused on hardware bills of materials and vulnerability analysis, secure login and authentication, software bills of materials and supply chain security, serverless SecOps, and scoring AI/ML models as part of risk management.
The winner of the DataTribe Challenge was Vigilant Ops, which signals an increased focus on securing the building blocks of hardware and software products, says John Funge, managing director at DataTribe.
Investors Eat Up AI/ML While AI might feel new, it has actually been a critical factor in cybersecurity for years.
The development and evolution of artificial intelligence has shaped the direction of cybersecurity, in terms of both technical capabilities and the democratization of tool development and use.
The defensive use of AI will need to evolve not just to answer the onslaught of new threats, but also to provide a new level of continuous monitoring, anticipate and predict where threats will go next, look for poisoned data meant to throw off AI models, detect false positives, and characterize other new phenomena.
The focus on authentication, threat intelligence, and AI tools across these two programs reflects the broader cybersecurity landscape, where organizations are looking for better authentication methods and improved intelligence about attacker activity.
Supply chain security is also becoming a bigger part of the conversation as adversaries increasingly target third-party components in order to compromise applications and devices.
Here the startup space often outpaces large enterprise solutions in speed of innovation and product availability.
That makes it an exciting time for cybersecurity startups focusing on AI, as well as investors looking for new ways to tackle old problems.


This Cyber News was published on www.darkreading.com. Publication date: Wed, 27 Dec 2023 14:00:32 +0000


Cyber News related to AI, Supply Chain Are Fertile Areas for Cybersecurity Investment

Software Supply Chain Security Checklist - In the ever-evolving landscape of digital innovation, the integrity of software supply chains has become a pivotal cornerstone for organizational security. Software supply chain security is not just about protecting code - it's about safeguarding the ...
9 months ago Feeds.dzone.com
New "MITRE ATT&CK-like" framework outlines software supply chain attack TTPs - A new open framework seeks to outline a comprehensive and actionable way for businesses and security teams to understand attacker behaviors and techniques specifically impacting the software supply chain. The Open Software Supply Chain Attack ...
1 year ago Csoonline.com
AI, Supply Chain Are Fertile Areas for Cybersecurity Investment - The past year has been a busy one for startups, with investors re-evaluating their rules on what kind of companies to invest in and larger companies going shopping for innovative technologies. Focusing on individual acquisitions or startup launches ...
10 months ago Darkreading.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
5 months ago Feeds.fortinet.com
CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force - The Task Force, chaired by CISA's National Risk Management Center and the Information Technology and Communications Sector Coordinating Councils, is a public-private partnership composed of a diverse range of representatives from public and private ...
9 months ago Cisa.gov
Top cyberthreats for 2024 - Ransomware-as-a-service has emerged as a significant threat, allowing individuals without extensive technical knowledge to launch ransomware attacks, further increasing the frequency and breadth of these attacks. Many ransomware attacks exploit ...
9 months ago Offsec.com
SCS 9001 2.0 reveals enhanced controls for global supply chains - In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses SCS 9001 Release 2.0, a certifiable standard crafted to assist organizations in operationalizing the NIST and other government guidelines and frameworks. ...
10 months ago Helpnetsecurity.com
Securing the Supply Chain - Before a supply chain can be improved, it must be understood. Rather than attacking one target, it is more effective to manipulate the supply chain to gain access to multiple targets. The 2013 Target breach was an example of a supply chain attack, as ...
1 year ago Securityweek.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com
Investment Scams Grow, 13,000 Domains Detected in January 2024 - Internet security experts have detected and blocked nearly 13,000 fake investment platform domains across more than 7000 IPs in January 2024, a 25% increase from December 2023. The figure comes amid growing concerns over the escalating threat of ...
7 months ago Infosecurity-magazine.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
10 months ago Darkreading.com
New Survey Finds a Paradox of Confidence in Software Supply Chain Security - Get results of and analysis on ESG's new survey on supply chain security. New research reveals that, despite increasing attacks and incidents against software supply chains, a surprising number of firms believe their defense is sufficient. This gap ...
5 months ago Securityboulevard.com
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com
UK, ROK sound alarm over North Korean supply chain attacks The Register - The national cybersecurity organizations of the UK and the Republic of Korea have issued a joint advisory warning of an increased volume and sophistication of North Korean software supply chain attacks. "In an increasingly digital and interconnected ...
11 months ago Theregister.com
How AI could bolster software supply chain security - SAN FRANCISCO - While supply chain risks remain prevalent across enterprises of all sizes, Synopsys' Tim Mackey said AI tools will enable developers more than attackers - at least for now. Supply chain security was a significant topic that speakers ...
5 months ago Techtarget.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
8 months ago Securityzap.com
Assessing and mitigating cybersecurity risks lurking in your supply chain - Most involve the supply of software and digital services, or at least are reliant in some way on online interactions. SMBs in particular may not proactively be looking, or have the resources, to manage security in their supply chains. Blindly ...
9 months ago Welivesecurity.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
10 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
10 months ago Securityzap.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
11 months ago Feeds.dzone.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
10 months ago Securityintelligence.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)