YL Ventures
Why hospitals are the next frontier of cybersecurity
Hospital cybersecurity is a pressing problem with unique challenges and incalculable stakes. The healthcare industry’s accelerating adoption of sophisticated networks, …
YL Ventures expands advisory board with 24 cybersecurity executives
YL Ventures, the Silicon Valley headquartered seed-stage venture capital firm focusing on Israeli cybersecurity innovation, announced a major expansion of its Venture Advisory …
Three security trends to watch for at Black Hat USA 2018
Thus far in 2018, organizations and individuals worldwide have experienced a large number of high profile cyber attacks, with criminals stealing billions of dollars as well as …
CyberMap: Live map of Israel’s cybersecurity ecosystem
During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israel’s cybersecurity ecosystem. The live landscape enables interactive filtering based on: …
Vulcan Cyber announces continuous vulnerability remediation platform and $4M seed round
Israeli startup Vulcan Cyber today announced $4 million in seed funding for its mission to eliminate the vulnerability remediation gap that unnecessarily exposes enterprises …
Medigate announces $5.35M seed round to protect connected medical devices
Israeli startup Medigate today announced $5.35 million in seed funding for its mission to secure the use of the millions of connected medical devices on healthcare provider …
Axonius announces $4M seed round to secure the explosion of connected devices
Israeli startup Axonius today announced $4 million in seed funding for its mission to secure and manage the growing billions of connected devices in use by businesses. Backing …
Featured news
Resources
Don't miss
- SafeLine: Open-source web application firewall (WAF)
- Securing AI’s new frontier: Visibility, governance, and mitigating compliance risks
- Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449)
- Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
- Phishers send corrupted documents to bypass email security