πŸ’° Security, Funded #47 - Internet Friends, Out of Stealth, Growth

The Security, Funded newsletter issue #47 - Cybersecurity funding and M&A news from the week of June 6th, 2022.

Good morning,

I hope you had a great weekend!

As expected, there was a lot of action just waiting for the RSA conference to come out of stealth mode.

Speaking of being out of stealth mode, I opened a store.

Attending RSA was a blast this year! It was amazing to see people I haven’t seen in years and meet Twitter and LinkedIn friends for the first time in person.

It was also incredible to hear that people have found this newsletter so helpful. Someone even told me I was β€œdoing a great service for the industry” and that I β€œmake [their] job easier.” 😳

Comments like those are truly impactful for me and gives me the energy to keep going and improving. (I’m not crying happy tears, you are! 😭πŸ₯Ή)

I also got the chance to hang out and feel included with some of the creator giants in this industry (I'm the floating beard head).

Let's dive in.



πŸ’° Summary

  • 17 companies raised $467.9M across 14 unique product categories
  • 5 companies were acquired or had a merger event

🧩 By Product Category

  • $110.0M for Continuous Compliance
  • $100.0M for Data Access Governance
  • $75.5M for Data Protection
  • $70.0M for SaaS Security
  • $35.0M for Security Awareness
  • $35.0M for Governance, Risk, and Compliance (GRC)
  • $15.0M for Managed Security Services Provider (MSSP)
  • $10.0M for Identity and Access Management (IAM)
  • $8.0M for Open-Source Intelligence (OSINT)
  • $7.4M for Personal Cybersecurity
  • $1.0M for Security Orchestration and Automated Response (SOAR)
  • $1.0M for Endpoint Protection
  • An undisclosed amount for Operational Technology (OT) Security
  • An undisclosed amount for Application Security

πŸ—£οΈ SPONSOR

πŸ—£οΈ
Software Supply Chain Security Checklist

7 rules for protecting your components and pipelines from attack

As the software components and delivery pipelines that comprise supply chains get more complex, so do the requirements for securing them. This checklist breaks down the components of supply chains to identify, prioritize, and address risks faster and proactively protect them from attacks. Download the guide for free!

🏒 By Company


🀝 Mergers & Acquisitions


πŸ” Secure The Job

If you're looking for new opportunities (actively or passively), I've got two ways to help:

  • Return on Security Job Board - Browse the jobs I curate each week and apply for what matches your interests.
  • Return on Security Talent Collective - Join the talent collective to get personally matched with high-growth, high-upside opportunities. This is invite-only, curated by me, and you can set your profile to be public or anonymous.

Search firms, recruiters, and hiring managers - hire the best talent from the Return on Security community by signing up here.


πŸ“š Great Reads & Finds

  • Scaling Appsec at Netflix (Part 2) - The Application Security teams at Netflix are responsible for securing the software footprint that we create to run the Netflix product, the Netflix studio, and the business.
  • Why AIs Will Become Hackers - At a 2022 RSA Conference keynote, technologist Bruce Schneier asserted that artificial intelligence agents will start to hack human systems β€” and what that will mean for us.
  • Awesome iOS Security - A collection of awesome tools, books, courses, blog posts, and cool stuff about iOS Application Security and Penetration Testing.

πŸ§ͺ Labs

A poem about working in cybersecurity.


πŸŽ‰ Enjoying This Newsletter?

β™₯️
If you want to show your support you can:

- Share the newsletter
- Support independent publishing
- Shop the store
- Sponsor an issue

πŸ‘‹ Thanks

Have questions, comments, or feedback about this issue? I'd love to hear from you.

Reach out on Twitter or reply directly to the newsletter version of this issue.

Thanks for reading!

Cheers,

Mike P