www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
Submitted URL: https://t.sidekickopen07.com/s3t/c/5/f18dQhb0S7kF8cp80_V17vHt59hl3kW7_k2841CX6NGW35Qwvd1G7yjDW7vZ0Py6DXdqqf197v5Y04?te=W3R5hF...
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On February 22 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/cloud/rsac-sets-finalists-for-innovation-sandbox
Submission: On February 22 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More Webinars * Streamlining Your Patch Management Processes Mar 09, 2022 * Strategies For Securing Your Supply Chain Mar 02, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: CrowdStrike > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. 4. Event Black Hat Feb 24 Webinar | Inside the Cyber Safety Review Board: A Fireside Chat w/ Jeff Moss | <REGISTER NOW> Event Streamlining Your Patch Management Processes | March 9 Webinar | <REGISTER NOW> Event Strategies For Securing Your Supply Chain | March 2 Webinar | <REGISTER NOW> Event Cybersecurity Technology: Where It's Going & How To Get There | March 24 Virtual Event | <REGISTER NOW> PreviousNext Cloud 1 min read slideshow RSAC SETS FINALISTS FOR INNOVATION SANDBOX The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year. Curtis Franklin Senior Analyst, Omdia February 06, 2020 PDF 1/6 (Image: BluBracket) BluBracket The technology of BluBracket looks into application code to find issues that could turn into security problems. The two components of BluBracket's protection suite tackle different aspects of the code, protecting it from issues that could be introduced at different phases of development. BluBracket:CodeInsights give team leaders visibility into the ownership of and access to all the various bits and pieces of code that go into making a modern application. BluBracket:CodeSecure searches code for "secrets," from passwords and tokens to unauthorized code that might have sneaked in during a session using Github, Stack Overflow, or another code repository. BluBracket was founded in 2019 and has received seed funding, with SignalFire and Unusual Ventures the most recent investors. For 14 years, 10 companies have taken the stage at the RSA Conference to make their case for the most promising, innovative technology. Now, the conference has named the 10 finalists for the RSA Innovation Sandbox presentations that will give venture capitalists, investors, competitors, and conference attendees the chance to see some of the latest in technology from these young companies. The RSAC Innovation Sandbox gives each participant 3 minutes — no more — to make their presentation. In that time, they must sell both the product or service and their company with what is typically a well-rehearsed, finely honed, and frequently high-speed spiel. This year, the Sandbox's 15th, the presentations will take place at the Moscone Center beginning at 1:30 p.m. PST. By 4:30 p.m. that same day, one company will be preparing to celebrate. According to RSAC, the 140 previous finalists in the Innovation Sandbox have collectively seen 48 acquisitions and raised $5.2 billion in investments. The question is how much the ten companies on the list that follows will add to those totals. (Image: goodmoments VIA Adobe Stock) Previous slide Next slide Vulnerabilities/ThreatsPerimeterApplication SecurityThreat IntelligenceOperationsCompliance Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Recommended Reading: More Insights White Papers * Vantage Inspect Next Gen SAST * Vantage Prevent Datasheet More White Papers Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain More Webinars Reports * How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World * 6 Threats Enterprises Should Care About More Reports Editors' Choice Google Paid Record $8.7 Million to Bug Hunters in 2021 Jai Vijayan, Contributing Writer What CISOs Should Tell the Board About Log4j Liran Tancman, CEO & Co-Founder, Rezilion 8 Security Dinosaurs and What Filled Their Footprints Ericka Chickowski, Contributing Writer Experts: Several CVEs From Microsoft's February Security Update Require Prompt Attention Jai Vijayan, Contributing Writer Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain * Rethinking Asset Management to Improve Enterprise Security * The Tech Exec’s Ransomware Incident Response Playbook * Practical Approaches to Implementing Zero Trust in Your Private Cloud More Webinars White Papers * Vantage Inspect Next Gen SAST * Vantage Prevent Datasheet * Extended Detection and Response (XDR) - Beginner's Guide * EMA - Security Cloud Assets: How IT Security Pros Grade Their Own Progress * The Defender's Advantage - a guide to activating cyberdefense More White Papers Events * Dark Reading Virtual Event - March 24 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV More Events More Insights White Papers * Vantage Inspect Next Gen SAST * Vantage Prevent Datasheet More White Papers Webinars * Streamlining Your Patch Management Processes * Strategies For Securing Your Supply Chain More Webinars Reports * How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World * 6 Threats Enterprises Should Care About More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept