Welcome to the June issue of Talking Cyber, YL Ventures’ cybersecurity newsletter.
We are excited to share the latest cybersecurity news, trends and innovations from across the globe, as well as tips for cybersecurity entrepreneurs and professionals.
We hope you enjoy this issue and would love to get your feedback!

YL Ventures Team
Serious Flaws Found in Philips Patient Monitoring Devices
Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars
DNA Testing Service MyHeritage Says 92 Million User Accounts Have Been Compromised
China Hacked a Navy Contractor and Secured a Trove of Highly Sensitive Data on Submarine Warfare
Cryptocurrency Theft Tops $1 Billion in Past Six Months
Read more on Security Week »
Atlanta Officials Reveal Worsening Effects of Cyber Attack
White House Reportedly Eliminates Top Cybersecurity Role

Summer is here, and things are heating up at YL Ventures.

First of all, we are very proud to announce our new portfolio company, Vulcan Cyber!

Vulcan Cyber closes the “Vulnerability Remediation Gap,” making it possible for companies to fix critical vulnerabilities within hours instead of months. YL Venture’s managing partner, Yoav Leitersdorf attributes his excitement about the product and team (consisting of Yaniv Bar Dayan, Tal Morgenstern, and Roy Horev) to “a combination of the founders’ incredible talent and the market’s crying need for their solution.”

We also have some exciting upcoming events in Tel Aviv. June 17th marks the official start of CyberWeek 2018 at Tel Aviv University. YL Ventures will be there all week, but the real action will start Wednesday the 20th. Starting at 4:30 PM, we will be hosting our Startup CyberStorm event, where 3 promising cybersecurity startups will pitch their ideas to a panel of international experts, who will then provide additional advice and feedback.

Additionally, we will be partnering with Momentum Cyber to put on an exclusive Fireside Chat on Wednesday, June 20th, 7:30 PM. YL Venture’s Managing Partner, Yoav Leitersdorf will moderate a panel of distinguished international cybersecurity experts, including: Dave DeWalt (Founder Nightdragon, Chairman, Momentum Cyber), Justin Somaini (CSO of SAP) ; Andy Ellis (CSO of Akamai); Eric McAlpine (Managing Partner, Momentum Cyber); and Galina Antova, Co-Founder & Chief Business Development Officer, Claroty). We’re eagerly looking forward to this action-packed week and hoping to see you all there.

Stay tuned for more exciting, soon-to-be announced news!

Medigate unveiled its medical device cybersecurity app for the Palo Alto Networks® Application Framework, and it is set to become fully available August 2018.  Learn More »
Axonius was named by leading enterprise security publication, CSO as one of their picks for “Hottest cybersecurity products at RSA 2018.” Learn More »
Karamba Security was named a Cool Vendor in the latest Gartner, Inc. Cool Vendors in IoT Security, 2018 report.  Learn More »
Twistlock won special recognition from Cyber Defense Magazine’s InfoSec Awards, being named “Editors Choice for Application Security.”  Learn More »
Vulcan Cyber announced its $4M seed round. Vulcan CEO, Yaniv Bar Dayan provides fascinating insights into the product & process in his Medium blog.  Learn More »
Adam Ely – VP & Deputy Chief Information Security Officer (CISO) at Walmart
Adam recently joined YL Ventures as a Venture Advisor
"Know the value as well as the challenges your product creates. Every product adds some level of complexity to the customer's environment. Know, solve, and sell through the perceived challenges but never ignore it.

Adam Ely is is a VP & Deputy Chief Information Security Officer (CISO) at Walmart, the world's largest retailer. Previously, he co-founded Bluebox Security, acquired in 2016, was the CISO of Salesforce's Heroku business unit, and led security and compliance at TiVo and within The Walt Disney Company.

About Adam Ely »
Round: $4M Seed
Field: Vulnerability Remediation
Learn more »
Round: $30M Series B
Field: IoT Security
Learn more »
Round: $30M
Field: Endpoint Detection
Learn more »
Round: $18M Series B
Field: Detection and Response
Learn more »
Round: $15M Series B
Field: Breach & Attack Simulation
Learn more »
Round: $10M Series B
Field: SIEM
Learn more »
Round: $10M Seed
Field: Network Security
Learn more »
Round: $8M Series A
Field: Behavioral Biometrics
Learn more »
Round: $5M Seed 
Field: Third Party Security Management
Learn more »
Round: $175M Secondary Market
Field: Endpoint Security
Learn more »
Round: $25M Series B
Field: Container Security
Learn more »
Round: $25M Series B
Field: Email Security
Learn more »
Round: $21.9M Series A
Field: IoT Security
Learn more »
Round: $20M Series B
Field: MSSP
Learn more »
Round: $15M
Field: Blockchain
Learn more »
Round: $8.2M Series A
Field: WAF
Learn more »
Acquired by: Palo Alto Networks
Amount: $100M
Field: EDR

Learn more  »
Acquired by: RSA
Amount: Undisclosed

Field: UEBA
Learn more  »
Acquired by: TransUnion
Amount: Undisclosed

Field: Authentication
Learn more  »
Acquired by: CA Technologies
Amount: Undisclosed

Field: Application Security
Learn more  »
Acquired by: Fortinet
Amount: Undisclosed

Field: IoT Security
Learn more  »
Why the Zero-Trust security model is surprisingly trustworthy.

The Zero-Trust security model (popularized by Google in a 2014 research paper) abandons the traditional notion that activity, once within a security perimeter, be deemed trustworthy by default. Instead, the Zero-Trust model enforces the perimeter at a much more granular level. All access is authenticated, encrypted and authorized based on an individual's identity and unique access privileges. 

A big advantage to such Software Defined Perimeters (SDPs) is they circumvent restrictions due to network location. If the user meets the criteria as predefined, they can safely work from anywhere without having to use a VPN – whether they're within the enterprise network, or out at any hotel, café, airplane, etc… Modern business culture and practice (remote-work, cloud access, multiple devices) fundamentally diminish the effectiveness of a circle of automatic trust defined by a centralized perimeter. Zero-Trust offers a dynamic, skeptical approach to verifying network security and ultimately makes for a more practical and secure experience for organizations and their employees.

Cyber Week 2018

Tel Aviv, Israel
17-21 June 2018   
Event Info »

YL Ventures is excited to partner with Cyber Week and host Startup CyberStorm. Join us!

New York CISO Executive Summit

New York, NY, USA
27 June 2018   
Event Info »

OWASP AppSec Europe

London, United Kingdom
2-6 July 2018   
Event Info »

Black Hat USA 2018

Las Vegas, NV, USA
4-9 August 2018   
Event Info »

Like this newsletter? 
YL Ventures funds & supports brilliant Israeli tech entrepreneurs from seed to lead. Headquartered in Silicon Valley with deep roots in Israel, we manage approximately $135 million of venture capital investment funds focused primarily on cybersecurity.

Copyright © 2018 YL Ventures, All rights reserved.

If you were forwarded this newsletter, you can subscribe here
For an archive of previous editions click here

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list