www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

Submitted URL: https://t.sidekickopen07.com/s3t/c/5/f18dQhb0S7kF8cp80_V17vHt59hl3kW7_k2841CX6NGW35Qwvd1G7yjDW7vZ0Py6DXdqqf197v5Y04?te=W3R5hF...
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On February 22 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Dark Reading Virtual Event - March 24 - Learn More
   
 * Black Hat Spring Trainings - June 13-16 - Learn More
   

Webinars
 * Streamlining Your Patch Management Processes
   Mar 09, 2022
 * Strategies For Securing Your Supply Chain
   Mar 02, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: CrowdStrike >
Partner Perspectives: Darktrace >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 
 4. 

Event
Black Hat Feb 24 Webinar | Inside the Cyber Safety Review Board: A Fireside Chat
w/ Jeff Moss | <REGISTER NOW>
Event
Streamlining Your Patch Management Processes | March 9 Webinar | <REGISTER NOW>
Event
Strategies For Securing Your Supply Chain | March 2 Webinar | <REGISTER NOW>
Event
Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual
Event | <REGISTER NOW>
PreviousNext


Cloud

1 min read

slideshow



RSAC SETS FINALISTS FOR INNOVATION SANDBOX

The 10 finalists will each have three minutes to make their case for being the
most innovative, promising young security company of the year.
Curtis Franklin
Senior Analyst, Omdia
February 06, 2020
PDF

1/6


(Image: BluBracket)

BluBracket

The technology of BluBracket looks into application code to find issues that
could turn into security problems. The two components of BluBracket's protection
suite tackle different aspects of the code, protecting it from issues that could
be introduced at different phases of development.

BluBracket:CodeInsights give team leaders visibility into the ownership of and
access to all the various bits and pieces of code that go into making a modern
application. BluBracket:CodeSecure searches code for "secrets," from passwords
and tokens to unauthorized code that might have sneaked in during a session
using Github, Stack Overflow, or another code repository.

BluBracket was founded in 2019 and has received seed funding, with SignalFire
and Unusual Ventures the most recent investors.

For 14 years, 10 companies have taken the stage at the RSA Conference to make
their case for the most promising, innovative technology. Now, the conference
has named the 10 finalists for the RSA Innovation Sandbox presentations that
will give venture capitalists, investors, competitors, and conference attendees
the chance to see some of the latest in technology from these young companies.



The RSAC Innovation Sandbox gives each participant 3 minutes — no more — to make
their presentation. In that time, they must sell both the product or service and
their company with what is typically a well-rehearsed, finely honed, and
frequently high-speed spiel. This year, the Sandbox's 15th, the presentations
will take place at the Moscone Center beginning at 1:30 p.m. PST. By 4:30 p.m.
that same day, one company will be preparing to celebrate.

According to RSAC, the 140 previous finalists in the Innovation Sandbox have
collectively seen 48 acquisitions and raised $5.2 billion in investments. The
question is how much the ten companies on the list that follows will add to
those totals.



(Image: goodmoments VIA Adobe Stock)


Previous slide
Next slide
Vulnerabilities/ThreatsPerimeterApplication SecurityThreat
IntelligenceOperationsCompliance
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe


Recommended Reading:

More Insights
White Papers
 * 
   Vantage Inspect Next Gen SAST
 * 
   Vantage Prevent Datasheet

More White Papers
Webinars
 * 
   Streamlining Your Patch Management Processes
 * 
   Strategies For Securing Your Supply Chain

More Webinars
Reports
 * 
   How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic
   World
 * 
   6 Threats Enterprises Should Care About

More Reports

Editors' Choice
Google Paid Record $8.7 Million to Bug Hunters in 2021
Jai Vijayan, Contributing Writer
What CISOs Should Tell the Board About Log4j
Liran Tancman, CEO & Co-Founder, Rezilion
8 Security Dinosaurs and What Filled Their Footprints
Ericka Chickowski, Contributing Writer
Experts: Several CVEs From Microsoft's February Security Update Require Prompt
Attention
Jai Vijayan, Contributing Writer
Webinars
 * Streamlining Your Patch Management Processes
 * Strategies For Securing Your Supply Chain
 * Rethinking Asset Management to Improve Enterprise Security
 * The Tech Exec’s Ransomware Incident Response Playbook
 * Practical Approaches to Implementing Zero Trust in Your Private Cloud

More Webinars
White Papers
 * Vantage Inspect Next Gen SAST
 * Vantage Prevent Datasheet
 * Extended Detection and Response (XDR) - Beginner's Guide
 * EMA - Security Cloud Assets: How IT Security Pros Grade Their Own Progress
 * The Defender's Advantage - a guide to activating cyberdefense

More White Papers
Events
 * Dark Reading Virtual Event - March 24 - Learn More
 * Black Hat Spring Trainings - June 13-16 - Learn More
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Vantage Inspect Next Gen SAST
 * 
   Vantage Prevent Datasheet

More White Papers
Webinars
 * 
   Streamlining Your Patch Management Processes
 * 
   Strategies For Securing Your Supply Chain

More Webinars
Reports
 * 
   How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic
   World
 * 
   6 Threats Enterprises Should Care About

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept