And in addition to its most basic use - inbound email security - Sublime can be used to gather and analyze trends in threats to an organization, block entire domains, run security exercises for compliance and training, and more. Its code can be applied to Microsoft 365 and Google Workspace enterprise mail systems, as well as run on individual accounts via IMAP. Sublime covers vectors like malware, ransomware, credential phishing, VIP impersonation and callback phishing. Now, as it moves into general availability it’s also announcing funding of $9.8 million.ĭecibel is leading the round, with Slow Ventures and a number of individuals in the world of cybersecurity participating, including Sounil Yu (the Cyber Defense Matrix and DIE Triad creator) Snort and Sourcefire creator Martin Roesch veteran CISOs Jerry Perullo and Michael Sutton Demisto founders Rishi Bhargava and Slavik Markovich Lookout founder Kevin Patrick Mahaffey and Phantom Cyber and Pangea founder Oliver Friedrichs. The Washington, DC-based startup has been operating in private beta for over one year, and in that time it’s picked up a number of large multinational customers ranging from government organizations through to companies like Spotify - along with a waiting list of 2,500 others. Today a startup called Sublime Security is emerging from stealth with a novel, collective approach for tackling that problem: it has built a platform, and domain-specific language (DSL), for researchers and security operations people - those defending networks - to write, run and share rules with each other for detecting and blocking the wide range of threats most (and least) commonly delivered via email. alone, according a report last year from the FBI. Email is by far the most popular entry point for setting up and executing phishing, ransomware and other attack vectors, leading to some $2.4 billion in damages in 2021 across business email interactions in the U.S. Malicious hackers are getting ever more creative with the techniques they use to break into networks to steal data and wreak havoc, but their primary route for opening that door has remained pretty consistent.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |