This Week: short on funding, long on research and analysis – ESW #363
Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process.
We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss.
A number of new product announcements continue to trickle out post-RSA.
We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess.
Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes!
Announcements
Get ready for an electrifying experience at the 15th annual Identiverse! Join 3,000+ identity professionals at the ARIA Resort & Casino in Vegas on May 28-31, 2024, for 4 days packed with dynamic learning & collaboration. Don't miss out on keynote speakers including Denee Defiore, CSIO of United Airlines; Tucker Bryant, Entrepreneur and Former Googler; George Roberts, Director of Identity and Access Engineering at McDonald's and many more!
As a community member, receive 25% off your Identiverse 2024 tickets using code IDV24-SW25!
Register today: securityweekly.com/idv2024
Dive into cybersecurity with CyberRisk Alliance for exclusive insights from RSA Conference 2024. Explore executive interviews with industry leaders, uncovering visionary perspectives on threats and strategies. Delve into curated articles on trends and innovations, equipping yourself with essential knowledge for today's cyber landscape. Visit securityweekly.com/RSAC for expert guidance and inspiration in navigating cybersecurity challenges confidently.
Hosts
- 1. FUNDING: SOCRadar Secures $25.2M in Funding to Combat Multibillion-Dollar Cyber Security Threats
- 2. ACQUISITIONS: CyberArk acquires Venafi for $1.54B, integrating human and machine IAM
We're overdue for a chat about Thoma Bravo. They've been a key exit point for security companies for many years. Let's talk about their past and present portfolio!
ACQUIRED, NOT EXITED
- Darktrace: Acquired for $5.3 billion in 2024.
- Ping Identity: Taken private for $2.8B in 2022 and merged with ForgeRock in 2023
- SailPoint: Taken private for $6.9B in 2022 (damn, they bought a lot of identity players!)
- Proofpoint: Acquired for $12.3 billion in 2021.
- Intel 471: Acquired for ??? in 2021. Acquired SpiderFoot and Cyborg Security.
- Sophos: Acquired for $3.9 billion in 2020.
- ConnectWise: Acquired for ??? in 2019. Acquired Continuum, ITBoost, Service Leadership, SmileBack, and Wise-Sync
- Apptio: Acquired for $1.94 billion in 2018.
- Imprivata: Taken private for $544M in 2016. Acquired Xton Technologies in 2021
ACQUIRED AND NOT SURE
- LogRhythm: Acquired for ??? in 2018 and merged with Exabeam in 2024, but not sure if Thoma Bravo exited in the process.
ACQUIRED AND EXITED
- ForgeRock: Acquired for $2.3B in 2023 and merged with Ping Identity in 2023
- Venafi: Acquired for ??? in 2020, and sold to CyberArk for $1.54B in 2024
- Exostar: Acquired for ??? in 2020 and sold to Arlington Capital Partners for ??? in 2023
- Imperva: Acquired for $2.1 billion in 2019 and sold to Thales for $3.6 billion in 2023.
- Veracode: Acquired from Broadcom for $950M in 2019 and sold to TA Associates for $2.5B in 2022.
- Delinea: Acquired as Centrify for ??? in 2018. Spins out IDaaS business as Idaptive. Sells to TPG for ??? in 2021. TPG merges Centrify with Thycotic in 2021 and rebrands as Delinea in 2022. Acquires Fastpath in 2024.
- Barracuda Networks: Acquired for $1.6B in 2018. Acquires SKOUT Cybersecurity in 2021. Sells to KKR in 2022 for ???
- Continuum: Acquired in 2017 for ??? and merged with ConnectWise in 2019
- Bomgar: Acquired for ??? from TA Associates in 2016 and sold to Francisco Partners for ??? in 2018. FP combines it with BeyondTrust and rebrands to BeyondTrust
- DigiCert: Acquired in 2015 for ??? and sold to TA Associates and Clearlake Capital for ??? in 2019.
- Blue Coat Systems: Acquired for $1.3 billion in 2012 and sold to Symantec for $4.65 billion in 2016.
- Tripwire: Acquired for ??? in 2011 and sold to Belden for $710 million in 2015.
- LANDESK: Acquired for ??? in 2010 and sold to Clearlake Capital for ??? in 2017. Clearlake combined it with HEAT Software to create Ivanti.
- SonicWall: Took private for $717M in 2010 and sold to Dell for $1.2B in 2012.
- Entrust: Acquired in 2009 for $124M and sold to Datacard for ??? in 2013.
Hungry for even more details? Check out Cole Grolmus's piece on Thoma Bravo here: https://strategyofsecurity.com/bravo-thoma-bravo/
- 3. MARKET ANALYSIS: Ross Haleliuk on LinkedIn: 13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel.
From Ross's post:
"13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel.
Bessemer recently published their 'Cybersecurity Trends in 2024' report. The report states that -
"Reflecting on the past year's acquisitions valued over $100 million, we observe two main trends: (1) most acquired companies had between 10 and 50 customers and were primarily targeted for their teams and products, and (2) the acquisition price for “product-only” companies has increased with a median of ~$200 million to $300 million over the past year."
One thing the report doesn't mention is that with the exception of Tessian which is based in the UK, all other startups are from Israel. Interestingly, the acquisition price for Tessian wasn't disclosed so even Bessemer ended up just putting '??' in place of one."
- 4. NEW COMPANIES: Guardz – The AI-Powered Cybersecurity and Cyberinsurance Provider
"tailored specifically for SMBs and their MSP partners"
- 5. NEW PRODUCTS: Cisco Hypershield: Reimagining Security
- 6. NEW PRODUCTS: Reveald Launches Epiphany Validation Engine to Enhance AI-Driven Cyber Resilience
I'm still getting used to CTEM instead of BAS, but I get very excited about any tech that lets defenders emulate attackers accurately, so that they can test the effectiveness of their controls.
- 7. AI ABUSE: What ScarJo v. ChatGPT Could Look Like in Court
In cybersecurity, it's important to try to anticipate what I call "abuse cases" - ways in which technology can be misused and abused, causing financial losses, reputational harm, or consumer/customer harm.
They're usually not demonstrated so explicitly by the founders of huge tech companies, but that's exactly what happened when Sam Altman decided to copy Scarlett Johansson's voice. Altman wanted to use the actress's voice for marketing, effectively reprising her role as the AI in the movie "Her".
He allegedly asked her to do some recordings for OpenAI last September, and she declined. Sam Altman found a way to use her voice anyway in an OpenAI demo, also tweeting "her" in case there was any uncertainty that the company's marketing was referencing the movie.
It's unclear if they used a voice actor soundalike, or generated her voice using AI (which seems more likely, given OpenAI's skillsets and access to AI tech), but regardless it created quite the debate when Johansson spoke out against the use of her voice without her consent.
The question now is, can they get away with it? If the answer is yes, then anyone's visual or audible likeness could simply be used for whatever by corporate entities, which doesn't seem like a great precedent to set. And can they weasel out of it by saying the likeness is a coincidence, or was unintended?
This precedent is exactly the concern in cybersecurity of executives being impersonated to pull off financial scams like BEC, or to fraudulently bypass identity verification measures.
Paul Graham wrote, "Though the most successful founders are usually good people, they tend to have a piratical gleam in their eye. They're not goody-two-shoes good. Morally they care about getting the big questions right but not about observing proprieties. That's why I'd use the word "naughty" rather than evil. They delight in breaking rules--but not rules that matter."
Do we think this is a rule that matters?
- 8. AI NEWS: Tech giants pledge AI safety commitments — including a ‘kill switch’ if they can’t mitigate risks
- 9. RESEARCH: A Third of CISOs Have Been Dismissed “Out of Hand” By the Board
- 10. RESEARCH: Last Week in GAI Security Research – 05/20/24
This is a great newsletter that summarizes GenAI research. I believe strongly that cybersecurity folks need to stay on top of the latest tech innovations and research, so that we can prepare ourselves and our people for What Comes Next.
There are some particularly interesting research papers in this week's edition.
- We continue to see purpose-built LLMs being trained. One paper focuses on LLMs that excel at steganalysis!
- Using LLMs to detect particular types of DDoS attacks
- SMS spam setection with explainability analysis
- Cyber activity news alerting language model (CANAL)
- and several more!
I'll never have time to read them all - maybe an LLM can help me out?
- 11. DUMPSTER FIRES: University Suspends Students for AI Tool It Gave Them $10,000 Prize to Make
This won't be the last we see of unintended consequences, or uninformed parties celebrating AI for the wrong reasons, and then shunning it, also for the wrong reasons. What a mess this school created.
- 12. TUTORIAL: Chaotic Good: Resilience Stress Tests at the Edge
Learn how to chaos engineer, from the queen of security chaos herself, Kelly Shortridge!
- 13. POST MORTEMS: A Bird’s-eye view: IceID to Dagon Locker (The DFIR Report)
Y'all know me - I LOVE pulling actionable lessons out of threat intel or a breach post mortem. The excellent DFIR Report has a new post out, and it's worth your time to dig through. Casey Smith, over at Thinkst, dug into it and shares how to use Canaries and Canarytokens to detect the TTPs explored in the DFIR Report writeup.
- 14. ESSAYS: Glory to the Glorifier
A very fun writeup from Thinkst about how they developed a stand to display their physical canaries at conference booths. It sounds like a small thing, but it's a window into Thinkst's success and their "if we're going to do a thing, we're going to do it well" philosophy.
No, it has nothing to do with cybersecurity, but it has everything to do with what's wrong with many cybersecurity vendors out there. Most VC-funded startups optimize to delight the investor and the acquirer, but rarely the customer. The points are for hitting the finish line at [time] with [amount] of ARR. There are no points for a working product, happy customers, good customer retention, or even sustainable growth.
- 15. SQUIRREL: “The Great Data Heist” Salesforce AI Ads with Matthew McConaughey