Remove 2017 Remove Antivirus Remove Cyber Insurance Remove Technology
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

Cyber Defense Magazine: Exclusive Interview with Robert Herjavec

Herjavec Group

Now, looking back, there isn’t a person on planet earth who would say that the cell phone is not an ‘obvious’ piece of technology. Check out how China teleported a photon into space in 2017. Teleportation is a building block for a wide range of technologies. Welcome to the information technology storm. Sounds absurd?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

This article looks at the top 40 cybersecurity startups to watch in 2022 based on their innovations in new and emerging technologies, length of operation, early funding rounds, scalability, and more. Series A SenseOn 2017 London, UK 61 $26.4 Series A GitGuardian 2017 Paris, France 63 $56.0 SECURITI.ai.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Once your micro-perimeters surround your most sensitive segments, there’s a need for ongoing monitoring and adaptive technology. This is especially true for your existing intrusion detection and prevention system (IDPS), antivirus, and anti-malware. Without external backups or rollback technology, recovery is impossible.

article thumbnail

What is Ransomware? Everything You Should Know

eSecurity Planet

Notable Ransomware Attacks CryptoLocker ushered in the modern ransomware age in 2013, and in 2017, the devastating WannaCry and NotPetya ransomware attacks raised the threat’s profile significantly. If you have a cyber insurer , they will have their own processes for responding to any cyber attack.