Linda Musthaler

Managing Editor

Security Current


Medical Device Security Startup Medigate Secures $5.35 Million in Seed Funding

Posted on: 14 Nov 2017

Israeli startup Medigate today announced $5.35 million in seed funding from YL Ventures, with additional funding from Blumberg Capital. The Tel Aviv-based company says it will use the investment to advance development of its dedicated medical device security platform. Medigate says its solution is a dedicated platform for securing networked medical devices that are connected…

Data Security Company Enveil Secures $4 Million in Strategic Funding

Posted on: 13 Nov 2017

The data security company Enveil today announced it has raised $4 million in strategic funding from key partners, including Thomson Reuters and a USAA affiliate as well as additional investment from Bloomberg Beta and DataTribe. The company, based in Washington, D.C., says it will leverage this capital to enhance its platform, expand operations, and execute a go-to-market…

Cybersecurity Platform Company Axonius Secures $4 Million in Seed Funding

Posted on: 05 Sep 2017

Israeli startup Axonius today announced $4 million in seed funding from YL Ventures, with participation from Vertex Ventures and Emerge Capital. The Tel Aviv-based company said the investment would be used to secure and manage the billions of connected devices in use by businesses by allowing IT and security operations teams to enable the agile…

Votiro Neutralizes Zero-Day Malware Embedded in Files to Thwart Attacks

Posted on: 14 Jul 2014

Attackers know that if they want to compromise an organization an email with a malicious link or attachment is often the path of least resistance. Armed with a wealth of information freely shared online, attackers use social engineering as a means to entice employees into opening the message, and if the malware is successful, the…

Seculert Delivers Advanced Threat Protection as a Cloud-based Solution

Posted on: 01 Mar 2014

Two months since the news of the massive Target breach broke, reports are starting to reveal bits and pieces of how the perpetrators were able to get a foothold inside Target’s point of sale system to steal tens of millions of customer account records. In time, there will be a complete forensic analysis of the…

Covertix SmartCipher Protects Key Confidential Files

Posted on: 03 Feb 2014

The healthcare market has been generating much attention lately.  Everyone from individuals to corporate executives is focused on the changes and provisions as they relate to health insurance. Well, almost everyone. The information security professionals in the healthcare industry are still focused on data security and how to best protect sensitive patient records from exposure…

Prevent SQL Injection Attacks with DB Networks’ New Core IDS

Posted on: 22 Nov 2013

What is the top threat to web applications today? According to the Open Web Application Security Project (OWASP), it’s SQL injection. The problem is so pervasive that it has topped the OWASP Top 10 list of software security issues for several years in a row, and for good reason. Hundreds of millions of database records have been stolen…

New Certification Launched for Healthcare Information Security and Privacy Professionals

Posted on: 07 Nov 2013

Insurance fraud. Identity theft. Financial fraud. These are just a few of the risks associated with storing personal healthcare information online. Healthcare organizations hold some of the most private and sensitive information, and if it were to be comprised, a breach of this data could have serious repercussions for individuals and organizations alike. To address…

Why Select “Video Surveillance” for your IT Systems?

Posted on: 06 Nov 2013

One day last summer I was in a bank branch, standing in line waiting to conduct my business. Bored, I studied my surroundings and took note of a security camera directed toward the teller station ahead of me. No doubt it was capturing video of each person that approached the teller window and especially of…

Skyhigh Networks Brings Discovery, Analysis and Security to Cloud Services

Posted on: 22 Oct 2013

At the start of the year, Wisegate, the networking organization for IT and InfoSec professionals, issued a report on the Top IT Security Threats of 2013. The report opens with what these leaders say is the root cause of this year’s most concerning security threats within their organizations: “Broadly speaking, the main threats that our…