article thumbnail

Top 10 Unexpected Learnings from Scaling Wiz From $0 to The First $100M ARR with founding CRO Colin Jones and Sam Blond

SaaStr

His background includes extensive experience in the cybersecurity space, beginning at Big Fix where he “fell in love with security” and at Duo Security. ” This distributed structure created intentional communication patterns that might not have developed in a single office.

Scale 191
article thumbnail

Buyer Trends: Top Insights from $3B in SaaS Transactions with Vendr

SaaStr

This has exposed an urgent need for improved cybersecurity measures so companies can mitigate risks and protect themselves against evolving threats.” Businesses spend big money on tools they believe are indispensable to their operations and success.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Tech Startup Founders in the UK for 2025

Scytale

Christopher Doman As co-founder and CTO of Cado Security – a leading platform for cloud-native digital forensics and incident response – Christopher Doman is a seasoned cybersecurity professional making waves in the tech startup space. GET ISO 27001 COMPLIANT 90% FASTER 6.

Startup 59
article thumbnail

Airbus shapes quantum computing’s future role in cybersecurity, aerospace

IT World

Airbus expects quantum computing to have major production, performance and efficiency benefits as the technology plays a role in its cybersecurity, aerospace and communications businesses. “We

article thumbnail

Navigating Cybersecurity: In-House Security Teams vs. Virtual CISOs

Scytale

However, in an unforgiving threat landscape, companies can’t afford to stagnate in terms of cybersecurity. This begs the question – is there an equally effective alternative to navigating cybersecurity instead of hiring an in-house security team, and if so, would that compromise the security standard?

article thumbnail

The 5 Functions of the NIST Cybersecurity Framework

Scytale

Their Cybersecurity Framework lays out five core functions to focus your efforts: Identify, Protect, Detect, Respond, and Recover. By understanding each function and implementing controls within them, you can develop a robust and risk-based cybersecurity program. The NIST Framework is one of those tools, so let’s dive in!

article thumbnail

The Fourth Industrial Revolution: The Intelligence Revolution

Clouded Judgement

This includes routers, switches, firewalls, load balancers, and high-speed interconnects, and communication standards like ethernet and infiniband (Mellanox) Routers: Routers direct data traffic between different networks, ensuring data packets reach their destination efficiently and accurately.