Cymatic Lets Companies Track Each Employee’s ‘Security Hygiene’

Cymatic Lets Companies Track Each Employee’s ‘Security Hygiene’

In March 2019, a breach exposed private data from more than 100 million Capital One customers across the U.S. and Canada. The breach wasn’t detected by the bank until early July. “Most security products even today are geared specifically around static-based...

Cymatic Lets Companies Track Each Employee’s ‘Security Hygiene’

Cymatic Lets Companies Track Each Employee’s ‘Security Hygiene’

In March 2019, a breach exposed private data from more than 100 million Capital One customers across the U.S. and Canada. The breach wasn’t detected by the bank until early July. “Most security products even today are geared specifically around static-based...

4 Security Startups Raise $46M in 4 Days

4 Security Startups Raise $46M in 4 Days

Four security startups announced nearly $46 million in their Series A and seed funding rounds this week over a period of four days. The fact that venture capital firms are writing huge checks to security companies isn’t exactly new. Momentum Cyber’s mid-year review...

Raleigh analytics firm Cymatic raises $4.5M in seed funding

Raleigh analytics firm Cymatic raises $4.5M in seed funding

RALEIGH — Cymatic, a Raleigh-based provider of user and entity behavior analytics, has raised $4.5 million in seed funding from prominent private angel investors. The firm said it will use the capital to fuel the development of its user and entity behavior analytics...

Cymatic Grabs $4.5 M in Seed

Cymatic Grabs $4.5 M in Seed

Raleigh, North Carolina-based Cymatic, a provider of user and entity behavior analytics platform, has secured $4.5 million in seed funding. The investors were not named. Read More

Cymatic Secures $4.5M in Seed Funding

Cymatic Secures $4.5M in Seed Funding

Cymatic, a Raleigh, N.C.-based provider of a user and entity behavior analytics (UEBA) platform that autonomously identifies and verifies a user’s security hygiene pre-endpoint and blocks any threats before they get past the browser, raised $4.5m in seed funding....

Cymatic Appoints Malcolm Harkins as Chief Security and Trust Officer

Cymatic Appoints Malcolm Harkins as Chief Security and Trust Officer

Former Cylance executive to drive business growth through strategic security, risk and privacy initiatives Raleigh — July 31, 2019 – Cymatic today announced the appointment of former Cylance senior executive Malcolm Harkins as Chief Security and Trust Officer. Harkins...

Do What You Believe, Do It Where You Belong, Do It Because It Matters. Why I Joined Cymatic

Do What You Believe, Do It Where You Belong, Do It Because It Matters. Why I Joined Cymatic

When deciding which company to work for, I believe you’re either running from something or you’re running towards something. When you run towards something, passion, purpose and curiosity are the driving forces. And, to be at your ideal state and to find the career most suited for you, I also believe it’s important to remember, “I Believe, I Belong, I Matter ℠.”

Familiar Implementation

You might hear something like "Cymatic Security implements in a way that's familiar to your user and your administrators." It's worth clarifying that, because it's a really powerful statement. No one likes to be told that a solution to a problem is "simple." Probably...

I Believe Many Use the Word “Threat” Incorrectly

I feel that too many people conflate "threat" and "vulnerability" but couldn't quite put my finger on a clear definition. I think I now can. I was listening to the estimable John Gruber's Talk Show podcast, episode 243 with Rich Mogull, where he talked all about...

Credential Stuffing Solution

Credential stuffing is one of the most common account takeover attacks. It is a cyber attack where attackers use stolen credentials to gain authorized access to enterprise systems through large-scale automated login requests. Today’s solutions to deal with credential...

Unknown Unknowns

When even a top security company needs to be told by the FBI that they've been hacked, you have to realize that something's simply missing in the way everyone is approaching cyber threat visibility. The Stat It turns out that it's not so unusual for an outsider to...

5 Capabilities to make your User Awareness programs more successful

When it comes to user awareness about cybersecurity health, I question common thinking about best practices. Companies try to teach people about cybersecurity so that they can make better decisions. This approach has three flaws: Not everyone is meant to be a...

Thank You NC State

Thank You NC State

This week we had the opportunity to attend an NC State career fair for student-athletes. It’s a milestone for us, just like a product release date. It means so much to be able to give students an opportunity to jump-start their working lives. North Carolina is our...

Death, Taxes, and a Data Breach

Certain things in this world are inevitable. Where there is life, there is death. Where there is government, there are taxes. And, where there is data, there is a breach. Like all things that are inevitable, it is not a question of if, it is a question of when. With...