Access "Information security market consolidation: A mixed bag"
This article is part of the July/August 2011 issue of Computer incident response teams are a new line of defense
In the middle of the last decade, SPI Dynamics was among the darlings of the security startup world. They had cool technology in a burgeoning segment of the security industry. The company’s profile was growing from modest beginnings (16 people, including three co-founders and a handful of engineers in an office behind a strip club near Georgia Tech University) to eventually to more than 150. Investors loved the little Web app security company that could. Four rounds of funding helped the company’s engineers develop products such as Web app pen-testing tool WebInspect, which were solving real-world security dilemmas. Revenue was doubling, literally, every quarter. The good times were rolling; the company still maintained that informal, startup feel too, and innovation was still the priority despite the increasing focus on business and shareholder satisfaction. “We were going through growing pains adjusting to being a bigger company and culture; it was crazy during our peak,” says Caleb Sima, one of the co-founders. Sima saw the handwriting on the wall; ... Access >>>
Premium Content for Free.
Information security market consolidation: A mixed bag
by Marcia Savage
Big tech companies are scooping up security vendors with mixed results.
PCI virtualization guidance warns of compliance challenges
by Robert Westervelt, News Director
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.
- Information security market consolidation: A mixed bag by Marcia Savage
Turn your computer incident response team into counter-threat operations
by Richard Bejtlich, Contributor
Fending off modern computer attacks requires actively hunting down intruders.
Striving for better information security intelligence
by Scott Crawford
Security teams strive to gain visibility from a deluge of security information and put that data to work.
- Turn your computer incident response team into counter-threat operations by Richard Bejtlich, Contributor
Your information security career and the job market: Value of information security skills
by Lee Kushner and Mike Murray
Be aware of changing technology and industry trends, and your job prospects will fall in line.
The threat landscape and Web 2.0 technologies
by Ravila Helen White, Contributor
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.
Does information security market consolidation mean the end of the line?
by Marcia Savage
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.
- Your information security career and the job market: Value of information security skills by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...