Detecting and containing a data breach takes the better part of a year, approximately 280 days, for the average organization, according to IBM’s 15th annual Cost of a Data Breach Report, Unfortunately, the longer it takes to identify a breach, the bigger the price tag of the overall breach lifecycle. This year’s report found that […]
VC Investment in Cybersecurity Dips & Shifts with COVID-19
While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.
We are currently seeking a technically capable product manager with knowledge of threat intelligence, security operations, and/or incident response best practices for a key position that works across our engineering, product management, marketing, sales, threat research, and customer success teams.
The day after scammers commandeered various high-profile Twitter accounts to conduct a bitcoin scam, cybersecurity professionals and the company itself tried to make sense of exactly what happened.