Threat Intelligence

The Fastest and Most Secure DNS

dnsfilter
I’ve been using
DNSFilter for a few weeks and it has been an absolute pleasure. The company recently closed an investment from Justin Label at InnerLoop Capital and I’ve gotten to know the founding team. DNSFilter has an AI engine that identifies a variety of malicious threats and does not have any humans in the loop. It is also really, really fast. DNSFilter Co-Founder and CEO Ken Carnesi agreed to answer a few questions about their approach to fast and secure DNS. Read More…

Highspeed Threat and Geographic Filtering with Threat Intelligence Gateways

bandura-tw

Bandura Cyber solves a variety of network security use cases for customers seeking to deploy a threat intelligence gateway. First, it can protect them by filtering 100% of all available hostile threat intelligence. I’ve found that large enterprises don’t deploy all of their threat intelligence to their firewalls because of performance impact and small business doesn’t buy threat feeds or know how to make use of them. Second, it can prevent and report traffic to or from countries, including hostile countries and countries with no business reason to be communicating with. For example, Bandura Cyber offers a very low-cost solution that can block all traffic communication with Russia that can be deployed to election infrastructure by entry level IT staff. And third, it can act as a control plane for orchestration products or managed detection and response firms that don’t have permission to modify firewall configurations. In this blog post, I asked Bandura Cyber Chief Strategy Office, Todd Weller, for an overview of the Threat Intelligence Gateway industry and more information about Bandura Cyber. Bandura Cyber is a Gula Tech Adventures portfolio company.
Read More…

Increasing the Efficiency of your Security Operations

grey-title

I first met Andrew Morris a few years ago when he was volunteering at a MAVA event. He pitched me his idea for GreyNoise and I really liked it. Being able to track different types of Internet scanning activity so you can remove this noise from your event stream is a great way to increase the effectiveness of your teams and tools. I liked his vision of supporting the community and having free and commercial APIs. Fast forward to now, Andrew was able to complete his initial funding and I am thrilled that Gula Tech Adventures (as an investor of Innerloop Capital) is working with him. Read More…

ABS, SDS & TIG — Three New Cyber Emerging Market Categories You Should Know



0*WZQR4nN5JP1T6AEF
The cyber industry continues to innovate and offer new ways to help organizations stay secure and compliant. Over the past few months I’ve observed analyst, media and pundit coverage of three new cyber product categories — software defined segmentationthreat intelligence gateways and automated breach simulation. All three offer many new ways to increase the effectiveness and efficiency of your security programs. I will discuss each briefly and reference relevant Gula Tech Adventures portfolio companies in these new categories.
Read More…

Memorizing Anything Including Hostile URLs and Malware Hashes with Polarity

0*Kp1er4YSjo8XlEiq
Early this year, Gula Tech Adventures and Strategic Cyber Ventures invested in a memory augmentation company named Polarity. Both of our funds focus on next generation cyber security companies and as such, I often get asked, “Why Polarity?”. I answer, “It makes every security team more efficient regardless of what tools, technology or data they use.”.
Read More…

CERT’s Blacklist Ecosystem Analysis: 2016 Update

0*bZjN9yQ4oqW-t-Nm
If you are not aware of CERT’s work in tracking the “IOC”, “threat sharing” and “threat feed” space, I highly suggest you take a look at their most recent update to the Blacklist Ecosystem Analysis paper.
Read More…