The Cybersecurity Pulse (TCP)

The Cybersecurity Pulse (TCP)

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
TCP #58: Playa Mode ๐Ÿœ๏ธ
Copy link
Facebook
Email
Notes
More
User's avatar
Discover more from The Cybersecurity Pulse (TCP)
The insidersโ€™ edge on security innovation, funding, and GTM plays. Be first, not last.
Over 5,000 subscribers
Already have an account? Sign in

TCP #58: Playa Mode ๐Ÿœ๏ธ

Security Product News | Aug. 20th - Aug. 28th, 2024

Darwin Salazar's avatar
Darwin Salazar
Aug 28, 2024
2

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
TCP #58: Playa Mode ๐Ÿœ๏ธ
Copy link
Facebook
Email
Notes
More
Share

Welcome to Issue 58 of The Cybersecurity Pulse! I'm Darwin Salazar, Product Manager at Monad and a former Detection Engineer. Each week, I distill the latest and most exciting developments in cybersecurity innovation into digestible, bite-sized updates. If youโ€™re serious about staying at the forefront of the latest in security products and industry news make sure to hit the โ€œSubscribeโ€ button below to get my insights delivered straight to your inbox every week ๐Ÿ“ฉ ๐Ÿš€

Howdy! Welcome to another issue of TCP! We had a fairly eventful week on the M&A + fundraising side of the house yet not so much on the product side. That said, AI security is at the forefront of this weekโ€™s newsletter with Clint Gibler and Francis Odum both releasing stellar pieces for practitioners, investors and everyone in between.

Just a heads up before we dive in: No TCP issue next week as Iโ€™ll be on vacation ๐ŸŒด Iโ€™ll be back with the next issue of TCP on the week of Sept. 9th! This should also serve as reminder for you to touch grass and use your PTO.

Anyhow, letโ€™s get into things! โš’๏ธ

Picks of the Week๐ŸŽฏ

  1. TL;DR: Every AI Talk from BSidesLV, Black Hat, and DEF CON 2024

    1. AI security was a HOT topic this hacker summer camp. Clint Gibler from tl;dr sec spent hours digging through the latest research and presentations to provide a easily digestible roundup of the 60+ talks that took place in Vegas earlier this month.

    2. No matter where you are in your AI security journey, his post is a great place to get brought up to speed on the latest AI research.

  2. Deep Dive Into The Security for AI Ecosystem

    AI Security Market Map by Francis Odum.

    Over the past two years, weโ€™ve seen dozens of AI security startups emerge and raise hundreds of millions in funding. I think that by now, we know that AI is not all fluff. AI is being rolled out across most industries and having real-world impact. That said, what does the past, present, and future of AI security look like?

    In this post,

    Francis Odum
    and Zain Rizavi take a very comprehensive look at the market for AI security and where it is headed. Worth the 20-30 minute sit down read!!

  3. How Prisma Cloud built Infinity Graph using Amazon Neptune and Amazon OpenSearch Service

    1. A look at how Palo Alto Networks built its Infinity Graph which helps map cloud asset attack paths, blast radius and few other cool things. Itโ€™s pretty cool to get a behind-the-scenes look at how they built a feature that now services thousands of enterprises. Worth checking out if you build security products! ๐Ÿ”ฅ

  4. Why LinkedIn Developed Its Own AI-Powered Security Platform

    Security Posture Platform overview
    Architecture for LinkedInโ€™s Security Knowledge Graph

    Itโ€™s always great getting an inside look at what world-class security teams are up to. Netflix, Chime, Rippling, Coinbase, Robinhood, Canva and the likes often publish open-source tools and articles that detail about how theyโ€™re approaching different security challenges.

    In this post, we get an inside look at LinkedIn AI-powered AI Security Graph. Of course, following a similar approach is something that only the top 1% of security teams can afford and pull off but its still pretty cool to see!

  5. NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents

  6. Breaking all rules: Bit Discoveryโ€™s journey of designing a perfect acquisition target and exiting in 3 years

  7. Cisco snaps up AI model and data security startup Robust Intelligence

    1. Robust Intelligence is the first pure play AI security startup to be acquired. Much more consolidation to come, imo and as highlighted by Francis and Zain in story #2.

  8. Check Point to Acquire External Cyber Risk Management Firm Cyberint

    1. More consolidation in the external attack surface management space (EASM). Just this year, NetSPI, Rapid7, (and a few others that I canโ€™t remember at the moment) have all acquired EASM vendors.

    2. The key trend this highlights is that context is king for prioritization. EASM vendors help shine a light on how reachable and exploitable vulnerable systems may be. If a critical vulnerability is surface on a VM that is not publicly accessible, then is it really a critical vuln? EASM helps provide comprehensive context in such scenarios.

  9. CISA to Get New Headquarters as $524M Contract Awarded

  10. Data management startup Cribl nabs $319M at $3.5B valuation

    1. Cribl recently announced a Series E round of $319M. Over the past couple of years, theyโ€™ve doubled down on their new product lines, Cribl Search and Cribl Lake. I imagine a good chunk of this funding will go toward R&D + GTM efforts for those while continuing to innovate on their Stream and Edge products. Either way, Iโ€™m a fan of what Cribl has done and where they are headed. Kudos to the great team there!

    2. Side note: Hereโ€™s a pretty great pod with Cribl founder and CEO, Clint Sharp on the Grit podcast hosted by Kleiner Perkins.

Product News ๐Ÿ“ฐ

AI Security

  • HITRUST unveils new tool for AI risk management

    • If I had to bet, healthcare is one of the biggest early adopters of AI. Up until recent years, it mustโ€™ve been the wild west in securing the use of AI in the sector. Things are definitely changing with the HITRUST consortia taking aim at AI security with their new AI Risk Assessment tool. More vendors and services companies are also doubling down on AI security.


Data Security

  • How Fabric plans to make advanced cryptography ubiquitous

    • Startup using novel approaches to cryptography including zero-knowledge proof and fully homomorphic encryption. Timely topic with more quantum computing and cryptography momentum building up.

  • Updated Fortanix Data Security Platform Adds File System Encryption


Email Security

  • Fortra Unveils Interoperable Bundles for Email Security


Offensive Security

  • GuidePoint Security releases Phishing as a Service

Bye For Now!

Thatโ€™s all for this weekโ€ฆ and next! Vacation starts now ๐Ÿฆฆ

Share

Camilla Trentini's avatar
2 Likes
2

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
TCP #58: Playa Mode ๐Ÿœ๏ธ
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
Wizโ€™s $32B GTM Playbook: Unpacking the Formula (Part I)
From Finding PMF to Nailing Branding
Mar 25 โ€ข 
Darwin Salazar
21

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
Wizโ€™s $32B GTM Playbook: Unpacking the Formula (Part I)
Copy link
Facebook
Email
Notes
More
4
Wizโ€™s $32B Sales Engine: From Founder-Led to Channel-Led Growth (Part II)
Inside Wizโ€™s transition to 100% channel sales, global blitzscaling, and how a top-down sales strategy helped them conquer the Fortune 100.
Apr 9 โ€ข 
Darwin Salazar
15

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
Wizโ€™s $32B Sales Engine: From Founder-Led to Channel-Led Growth (Part II)
Copy link
Facebook
Email
Notes
More
2025 RSAC Innovation Sandbox Finalists Announced
A look at this year's RSAC Innovation Sandbox Finalists
Apr 8 โ€ข 
Darwin Salazar
5

Share this post

The Cybersecurity Pulse (TCP)
The Cybersecurity Pulse (TCP)
2025 RSAC Innovation Sandbox Finalists Announced
Copy link
Facebook
Email
Notes
More
2

Ready for more?

ยฉ 2025 Darwin Salazar
Privacy โˆ™ Terms โˆ™ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.