Insights
Perspectives on cybersecurity trends, investing, and the forces reshaping the sector.
///////////////
//
BrowsE Insights
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
.webp)
13 Jun 2015
Standards Bring Order To Enterprise Software
The article examines how industry standards are bringing order to the fragmented enterprise software landscape, enabling interoperability between disparate systems and creating the common protocols that allow complex technology ecosystems to function reliably at scale. The analysis explores the role of standards bodies, open-source communities, and large technology vendors in establishing the foundations that support enterprise software innovation.
Ping Identity
.webp)
12 Jun 2015
The Enterprise Silo Problem Stubbornly Persists
The persistent problem of data and organizational silos in enterprise technology impedes efficient operations, slows decision-making, and creates security blind spots that attackers can exploit. The article makes the case for enterprise platforms and integration layers that break down these silos, enabling organizations to consolidate visibility and orchestrate workflows across previously disconnected security and IT systems.
Ping Identity

22 Apr 2015
In the Dark Corners of the Web, a ‘Spider’ Intercepts Hackers
Bloomberg profiles Darktrace's early development as a cybersecurity startup operating in the shadows of the intelligence community, describing how the company's 'unsupervised machine learning' approach was inspired by techniques developed at GCHQ and Cambridge University to detect previously unknown threats across enterprise networks. The article highlights Darktrace's unique origin story and the unconventional team that built one of the first autonomous cyber defense platforms.
Digital Shadows

12 Apr 2015
Cylance on 60 Minutes
Cylance CEO Stuart McClure appeared on CBS News' 60 Minutes to discuss North Korea's cyber attack on Sony Pictures, demonstrating how Cylance's AI-driven endpoint security platform detects and prevents sophisticated nation-state attacks that traditional signature-based tools miss. The segment highlighted the growing threat of state-sponsored cybercrime and Cylance's unique approach to predicting and preventing threats before they execute.
Cylance
06 Nov 2014
Ten Eleven Ventures - What's in a Name?
As we pondered naming the firm and looked at how the prior venture capital firms chose names, there were some obvious patterns: Names of trees (Sequoia, Sierra) Meaningful places/events Excitement adjectives (growth, inflection, scale, catalyze) People’s last names Since we are doing what we beli...
11 Oct 2014
A New Beginning
For years, security has been in the background and back channels of technology, a highly technical topic managed by the very few, highly technical minds who know the language or, in many cases, designed it.
There are no NewS matching your criteria.

