Close

IT / Cybersecurity

Software runs the nation’s commerce, utilities, and defense. Zero-trust architectures, quantum-resistant encryption, and autonomous threat hunting fortify those digital arteries, ensuring operations continue even under relentless cyber assault. Secure code is the unseen armor of a resilient economy.
Semgrep
Engineering-centric code security
Acq.
by
IPO
Semgrep
Engineering-centric code security
Acq.
by
IPO
IT / Cybersecurity
Semgrep
Engineering-centric code security
Acq.
by
IPO
Active
CyCognito
Actionable cybersecurity analysis and insights
Acq.
by
IPO
CyCognito
Actionable cybersecurity analysis and insights
Acq.
by
IPO
IT / Cybersecurity
CyCognito
Actionable cybersecurity analysis and insights
Acq.
by
IPO
Active
Material Security
Multi-layered visibility, defense-in-depth and security infrastructure
Acq.
by
IPO
Material Security
Multi-layered visibility, defense-in-depth and security infrastructure
Acq.
by
IPO
IT / Cybersecurity
Software Infrastructure
Material Security
Multi-layered visibility, defense-in-depth and security infrastructure
Acq.
by
IPO
Active
Netskope
Redefining cloud, data, and network security
Acq.
by
IPO
Netskope
Redefining cloud, data, and network security
Acq.
by
IPO
Software Infrastructure
IT / Cybersecurity
Netskope
Redefining cloud, data, and network security
Acq.
by
IPO
Active
Buoyant
Modern, cloud-native network security and reliability
Acq.
by
IPO
Buoyant
Modern, cloud-native network security and reliability
Acq.
by
IPO
IT / Cybersecurity
Buoyant
Modern, cloud-native network security and reliability
Acq.
by
IPO
Active
Monad
Organized pipeline for the modern security data stack
Acq.
by
IPO
Monad
Organized pipeline for the modern security data stack
Acq.
by
IPO
IT / Cybersecurity
Monad
Organized pipeline for the modern security data stack
Acq.
by
IPO
Active
Truffle Security
Resolving exposed secrets across the tech stack
Acq.
by
IPO
Truffle Security
Resolving exposed secrets across the tech stack
Acq.
by
IPO
IT / Cybersecurity
Truffle Security
Resolving exposed secrets across the tech stack
Acq.
by
IPO
Active
STEALTH CO
Post-quantum blockchain security
Acq.
by
IPO
STEALTH CO
Post-quantum blockchain security
Acq.
by
IPO
IT / Cybersecurity
STEALTH CO
Post-quantum blockchain security
Acq.
by
IPO
Stealth
Robust Intelligence
Automated security and safety testing for AI models
Acq.
by
Cisco
IPO
Robust Intelligence
Automated security and safety testing for AI models
Acq.
by
Cisco
IPO
IT / Cybersecurity
AI / Compute
Robust Intelligence
Automated security and safety testing for AI models
Acq.
by
Cisco
IPO
Exited
LeapYear
Securely unlock value from sensitive data assets
Acq.
by
Snowflake
IPO
LeapYear
Securely unlock value from sensitive data assets
Acq.
by
Snowflake
IPO
IT / Cybersecurity
LeapYear
Securely unlock value from sensitive data assets
Acq.
by
Snowflake
IPO
Exited