My 2014-15 Cybersecurity Venture Funding Report: Cybersecurity Newsletter Week of 8/10/15

Sign up for my newsletter to see interviews with the biggest names in cybersecurity.

My Report: 2014-15 Cybersecurity Venture and M&A, What are the Trends

For the past two weeks I’ve been going through some data on 2014 and 2015 cybersecurity funding and M&A and I decided to put together this report which I’ve uploaded to slide share. To make the report I downloaded funding data from my CB Insights student account and Mattermark’s Free Trial and I used Crunchbase for reference. Then I scrubbed the data and categorized all the companies into subsectors to look at trends. I’d love to hear any feedback that you have.

The News: 

Tanium is Apparently Raising Money at a $2.5 Billion Valuation

  • Apparently the valuation could go as high as $3 billion and they’re looking to expand their investor base beyond A16Z. The round they raised in March apparently valued them at $1.75 billion.

Nine Charged in $100 Million Insider Trading Case Tied to Hackers

  • The traders, working from their suburban homes, provided “shopping lists,” or companies for which they wanted press releases to hackers in Ukraine. The hackers then hacked into news sources such as MarketWired to extract press releases related to the companies.

The Veritas ‘Nightmare’ is Finally Over — Sells for $8 Billion to Carlyle

  • The transaction was completed at around 3x FY 2016 Veritas revenue estimates.

CyberArk acquires Israel-based Cybertinel

  • Cybertinel is an endpoint protection company that focuses on protecting against APTs.

The Pwnie Awards — 2015 Edition

  • Given out at Black Hat every year, the Pwnie Awards honor the achievements (and failures) in the information security space over the last year. Awards include Best Research and Best Server-Side Bug.

whiteCryption Listed in Gartner Hype Cycle 2015

  • Gartner lists the company as a vendor of Mobile Application Hardening, Application Shielding and Application Obfuscation. whiteCryption obfuscates code on mobile applications by rearranging blocks of code and renaming symbol key components of code.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s