www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7763
Public Scan
Submitted URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox/d/d-id/1336963?image_number=3]
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On March 02 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On March 02 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event Streamlining Your Patch Management Processes | March 9 Webinar | <REGISTER NOW> Event Strategies For Securing Your Supply Chain | March 2 Webinar | <REGISTER NOW> Event Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual Event | <REGISTER NOW> PreviousNext Cloud 1 min read slideshow RSAC SETS FINALISTS FOR INNOVATION SANDBOX The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year. Curtis Franklin Senior Analyst, Omdia February 06, 2020 PDF 1/6 (Image: BluBracket) BluBracket The technology of BluBracket looks into application code to find issues that could turn into security problems. The two components of BluBracket's protection suite tackle different aspects of the code, protecting it from issues that could be introduced at different phases of development. BluBracket:CodeInsights give team leaders visibility into the ownership of and access to all the various bits and pieces of code that go into making a modern application. BluBracket:CodeSecure searches code for "secrets," from passwords and tokens to unauthorized code that might have sneaked in during a session using Github, Stack Overflow, or another code repository. BluBracket was founded in 2019 and has received seed funding, with SignalFire and Unusual Ventures the most recent investors. For 14 years, 10 companies have taken the stage at the RSA Conference to make their case for the most promising, innovative technology. Now, the conference has named the 10 finalists for the RSA Innovation Sandbox presentations that will give venture capitalists, investors, competitors, and conference attendees the chance to see some of the latest in technology from these young companies. The RSAC Innovation Sandbox gives each participant 3 minutes — no more — to make their presentation. In that time, they must sell both the product or service and their company with what is typically a well-rehearsed, finely honed, and frequently high-speed spiel. This year, the Sandbox's 15th, the presentations will take place at the Moscone Center beginning at 1:30 p.m. PST. By 4:30 p.m. that same day, one company will be preparing to celebrate. According to RSAC, the 140 previous finalists in the Innovation Sandbox have collectively seen 48 acquisitions and raised $5.2 billion in investments. The question is how much the ten companies on the list that follows will add to those totals. (Image: goodmoments VIA Adobe Stock) Previous slide Next slide Vulnerabilities/ThreatsThreat IntelligencePerimeterOperationsApplication SecurityCompliance Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Recommended Reading: More Insights White Papers * Get the Gartner Report: SOC Model Guide * Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums More White Papers Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain More Webinars Reports * How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World * 6 Threats Enterprises Should Care About More Reports Editors' Choice Cyberattacks in Ukraine Soon Could Spill Over to Other Countries Jai Vijayan, Contributing Writer 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia Jai Vijayan, Contributing Writer Phishing Attack in Ukraine Could be Prelude to Disinformation Campaign Jai Vijayan, Contributing Writer Beyond the Hype: AI's Future in Defensive Cybersecurity Joshua Saxe, Chief Scientist, Sophos Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain * Making Deception a Part of Your Enterprise Defense Strategy * The 5 Executive Blind Spots Around Observability * Cybersecurity Tech: Where It's Going and How To Get There More Webinars White Papers * Get the Gartner Report: SOC Model Guide * Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums * Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization * 2022 Insurance Industry Cyber Threat Landscape Report * The Impact of XDR in the Modern SOC More White Papers Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Get the Gartner Report: SOC Model Guide * Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums More White Papers Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain More Webinars Reports * How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World * 6 Threats Enterprises Should Care About More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept