article thumbnail

$60 Million and Counting: Microsoft Rewards Bug Bounty Hunters

Penetration Testing

Launched in 2013, this initiative has become a cornerstone of Microsoft’s cybersecurity strategy, awarding over $60 million... The post $60 Million and Counting: Microsoft Rewards Bug Bounty Hunters appeared first on Penetration Testing.

article thumbnail

Automated Security and Compliance Attracts Venture Investors

eSecurity Planet

In 2013, Adam Markowitz founded Portfolium, an edtech startup that matched college students and graduates with employers. “I What’s more, the automated compliance and security software market is likely to benefit from slow growth or even a recession, as the technology can be a way to streamline operations and lower costs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SW Labs | Review: Bishop Fox CAST

SC Magazine

Originally founded in 2005 as Stach & Liu and rebranded in 2013, Bishop Fox is one of most widely recognized security services firms. One issue with traditional penetration tests is that they are point-in-time, typically performed only once or twice a year. Company background. CAST addresses both these shortcomings.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Brian Krebs | @briankrebs. Denial-of-Suez attack. Jason Haddix | @JHaddix.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Accel Investments. Evolution Equity Partners. EEP Investments.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. The project is based on work Baines did for Europol’s Cyber Crimes Center, Project 2020, which made a similar series of predictions in 2013 targeting last year. Photo by Mario Tama/Getty Images).