Privacy data management innovations reduce risk, create new revenue channels

Mark Settle Contributor Mark Settle is a seven-time CIO, three-time CIO 100 award winner and two-time book author. His most recent book is “Truth from the Valley: A Practical Primer on IT Management for the Next Decade.” Tomer Y. Avni Contributor Tomer Y. Avni is an MBA/MS student at the Harvard Business School and the […]

Ring to offer opt-in end-to-end encryption for videos beginning later this year

Ring will be stepping up its efforts to make its security products secure for users by enabling end-to-end video encryption later this year. The company will be providing this toggle in a new page in tits app’s Control Center, which will provide more information about Ring’s current encryption practices, and measures to keep user video […]

Selling a startup can come with an emotional cost

Every founder dreams of building a substantial company. For those who make it through the myriad challenges, it typically results in an exit. If it’s through an acquisition, that can mean cashing in your equity, paying back investors and rewarding long-time employees, but it also usually results in a loss of power and a substantially […]

Senate’s encryption backdoor bill is ‘dangerous for Americans,’ says Rep. Lofgren

A Senate bill that would compel tech companies to build backdoors to allow law enforcement access to encrypted devices and data would be “very dangerous” for Americans, said a leading House Democrat. Law enforcement frequently spars with tech companies over their use of strong encryption, which protects user data from hackers and theft, but the […]

JupiterOne raises $19M Series A to automate cyber asset management

Asset management might not be the most exciting talking topic, but it’s often an overlooked area of cyber-defenses. By knowing exactly what assets your company has makes it easier to know where the security weak spots are. That’s the problem JupiterOne is trying to fix. “We built JupiterOne because we saw a gap in how […]

HacWare wants you to hate email security a little less

Let’s face it, email security is something a lot of people would rather think less about. When you’re not deluged with a daily onslaught of phishing attacks trying to steal your passwords, you’re also expected to dodge the simulated phishing emails sent by your own company all for the sake of checking a compliance box. […]

Extra Crunch Friday roundup: Edtech funding surges, Poland VC survey, inside Shift’s SPAC plan, more

I live in San Francisco, but I work an East Coast schedule to get a jump on the news day. So I’d already been at my desk for a couple of hours on Wednesday morning when I looked up and saw this: What color is the sky this morning pic.twitter.com/nt5dZp5wWc — Walter Thompson (@YourProtagonist) September […]

Use ‘productive paranoia’ to build cybersecurity culture at your startup

As any startup grows, getting new products out the door and securing that next round of funding are always top priorities. But security, all too often, falls by the wayside. After all, why would you invest money in something that you hope never happens when you could be funneling cash back into the business? Fostering […]

It’s time to better identify the cost of cybersecurity risks in M&A deals

Rob Gurzeev Contributor Share on Twitter Rob Gurzeev is CEO and co-founder of CyCognito, a company focused on giving CISOs the advantage over attackers. Over the past decade, a number of high-profile cybersecurity issues have arisen during mega-M&A deals, heightening concerns among corporate executives. In 2017, Yahoo disclosed three data breaches during its negotiation to […]

How to respond to a data breach

I cover a lot of data breaches. From inadvertent exposures to data-exfiltrating hacks, I’ve seen it all. But not every data breach is the same. How a company responds to a data breach — whether it was their fault — can make or break its reputation. I’ve seen some of the worst responses: legal threats, […]