www.darkreading.com Open in urlscan Pro
2606:4700::6811:7763  Public Scan

Submitted URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox/d/d-id/1336963?image_number=3]
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On March 02 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 

Event
Streamlining Your Patch Management Processes | March 9 Webinar | <REGISTER NOW>
Event
Strategies For Securing Your Supply Chain | March 2 Webinar | <REGISTER NOW>
Event
Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual
Event | <REGISTER NOW>
PreviousNext

Cloud

1 min read

slideshow



RSAC SETS FINALISTS FOR INNOVATION SANDBOX

The 10 finalists will each have three minutes to make their case for being the
most innovative, promising young security company of the year.
Curtis Franklin
Senior Analyst, Omdia
February 06, 2020
PDF

1/6


(Image: BluBracket)

BluBracket

The technology of BluBracket looks into application code to find issues that
could turn into security problems. The two components of BluBracket's protection
suite tackle different aspects of the code, protecting it from issues that could
be introduced at different phases of development.

BluBracket:CodeInsights give team leaders visibility into the ownership of and
access to all the various bits and pieces of code that go into making a modern
application. BluBracket:CodeSecure searches code for "secrets," from passwords
and tokens to unauthorized code that might have sneaked in during a session
using Github, Stack Overflow, or another code repository.

BluBracket was founded in 2019 and has received seed funding, with SignalFire
and Unusual Ventures the most recent investors.

For 14 years, 10 companies have taken the stage at the RSA Conference to make
their case for the most promising, innovative technology. Now, the conference
has named the 10 finalists for the RSA Innovation Sandbox presentations that
will give venture capitalists, investors, competitors, and conference attendees
the chance to see some of the latest in technology from these young companies.



The RSAC Innovation Sandbox gives each participant 3 minutes — no more — to make
their presentation. In that time, they must sell both the product or service and
their company with what is typically a well-rehearsed, finely honed, and
frequently high-speed spiel. This year, the Sandbox's 15th, the presentations
will take place at the Moscone Center beginning at 1:30 p.m. PST. By 4:30 p.m.
that same day, one company will be preparing to celebrate.

According to RSAC, the 140 previous finalists in the Innovation Sandbox have
collectively seen 48 acquisitions and raised $5.2 billion in investments. The
question is how much the ten companies on the list that follows will add to
those totals.



(Image: goodmoments VIA Adobe Stock)


Previous slide
Next slide
Vulnerabilities/ThreatsThreat IntelligencePerimeterOperationsApplication
SecurityCompliance
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe


Recommended Reading:

More Insights
White Papers
 * 
   Get the Gartner Report: SOC Model Guide
 * 
   Selling Breaches: The Transfer of Enterprise Network Access on Criminal
   Forums

More White Papers
Webinars
 * 
   Streamlining Your Patch Management Processes
 * 
   Strategies For Securing Your Supply Chain

More Webinars
Reports
 * 
   How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic
   World
 * 
   6 Threats Enterprises Should Care About

More Reports

Editors' Choice
Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Jai Vijayan, Contributing Writer
7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
Jai Vijayan, Contributing Writer
Phishing Attack in Ukraine Could be Prelude to Disinformation Campaign
Jai Vijayan, Contributing Writer
Beyond the Hype: AI's Future in Defensive Cybersecurity
Joshua Saxe, Chief Scientist, Sophos
Webinars
 * Streamlining Your Patch Management Processes
 * Strategies For Securing Your Supply Chain
 * Making Deception a Part of Your Enterprise Defense Strategy
 * The 5 Executive Blind Spots Around Observability
 * Cybersecurity Tech: Where It's Going and How To Get There

More Webinars
White Papers
 * Get the Gartner Report: SOC Model Guide
 * Selling Breaches: The Transfer of Enterprise Network Access on Criminal
   Forums
 * Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting
   Your Organization
 * 2022 Insurance Industry Cyber Threat Landscape Report
 * The Impact of XDR in the Modern SOC

More White Papers
Events
 * Dark Reading Virtual Event - March 24 - Learn More
 * Black Hat Spring Trainings - June 13-16 - Learn More
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Get the Gartner Report: SOC Model Guide
 * 
   Selling Breaches: The Transfer of Enterprise Network Access on Criminal
   Forums

More White Papers
Webinars
 * 
   Streamlining Your Patch Management Processes
 * 
   Strategies For Securing Your Supply Chain

More Webinars
Reports
 * 
   How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic
   World
 * 
   6 Threats Enterprises Should Care About

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept