3M Sells Off 450 Person Biometric Tech Unit To Gemalto For $850m

sourced

Categories

screen-shot-2016-12-08-at-5-06-32-pmVia News Release

“ST. PAUL, Minn.–(BUSINESS WIRE)–3M announced today that it has entered into agreements to sell the identity management business within its Traffic Safety and Security Division, to Gemalto, the world leader in digital security, for $850 million, subject to closing and other adjustments.”

Read More »

Beta Byte: Pi-Hole

sourced

screen-shot-2016-11-02-at-1-06-38-pmBeta Byte is a series underwritten by Bust Out Solutions for that early stage tech found somewhere between idea and traction.

 
What is the name of the company and/or product?

Pi-hole

What distinct problem does this solve for who and how does this create value for them?

Pi-hole prevents ads from being downloaded for every device on your network without the need to install software. This helps save bandwidth because the ads are never downloaded. In addition, it helps protects users from malvertising.

Read More »

Beta Byte: Undercover Pics

sourced

screen-shot-2016-10-11-at-12-08-22-pmBeta Byte is a series underwritten by Bust Out Solutions for that early stage tech found somewhere between idea and traction.

 
The Founder: Tommy Tompkins

What is the name of the company and/or product?

The name of the product is Undercover Pics and it can be found at https://undercoverpics.com or on Twitter.

What distinct problem does this solve for who and how does this create value for them?

Undercover Pics is a steganography, encryption, and photo-sharing service that enables its users to conceal secret images inside cover photos and share them with friends. Our unique service goes beyond end-to-end encryption by protecting your important documents and images anywhere you put them; including your email account, phone, or hard drive without the need to install an app. Share passwords with a team, protect important documents, or promote your business with creative image based scavenger hunts where your customers can decode images to find clues to promotions or giveaway items.

How did you come up with the idea?

Read More »

Arthur Ventures Leads Funding Round In Cybrary

sourced

Categories

Via News Release

arthurventuresheaderCybrary, the world’s first and only no-cost cybersecurity MOOC (massive open online course) provider, has secured $1.3 million in an oversubscribed series seed financing led by Arthur Ventures and Ron Gula, Founder and Chairman of Tenable Network Security, with participation from existing investors, including Inner Loop Capital.”

Read More »

MN Startup SecretValet Launches Password Free Secure Data Sharing Service

Categories

Co4iJXsUsAAif64.jpg_large

SecretValet is out to change the way we secure and share digital assets by flipping the approach from pull to push.

Their service allows people to store important, sensitive, or personal information fully encrypted and have that information delivered to designated recipients when a triggering event takes place.

Read More »

HelpSystems Acquires Nebraska-Based Linoma Software to Meet Rising Security Demand

sourced

Categories

Via News Release

“(Marketwired – June 02, 2016) – HelpSystems announced today the acquisition of Linoma Software, whose secure managed file transfer (MFT) and data encryption products have propelled exciting growth. The acquisition broadens the HelpSystems security portfolio with solutions that fit specific needs and run on major operating systems.

Linoma Software is a Nebraska-based firm with more than 3,000 customers around the world. With Linoma’s GoAnywhere MFT™ solution, organizations centralize and secure data exchange with their business partners, customers, and employees — thanks to robust encryption and detailed audit trails.”

Read More »

Hennepin County’s Facial Recognition Surveillance Tech In The Limelight

sourced

Categories

By Tony Webster

Surveillance cameras have become a ubiquitous part of urban life: lamp posts, traffic signals, building corners, dash cams; they’re impossible to avoid. But in the Hennepin County Sheriff’s hopes for the future, these networks of cameras—possibly including privately owned cameras—could soon use real-time automatic facial recognition to create a database of everywhere you go.”

Read More…

RedTeam Security Shows How Easy It Is To Hack The Power Grid – By Doing It

sourced

Categories

Via TechInsider

“A power company in the Midwest hired a group of white hat hackers known as RedTeam Security to test its defenses. We followed them around for 3 days, as they attempted to break into buildings and hack into its network, with the goal of gaining full access. And it was all much easier than you might think. Based on our experiences, it would seem that power companies need to step up their game in the fight against cyber attackers or it could be “lights out.”

Read More…

Minnesota Security Startup Secured2 Partners With Microsoft & Grows BOD

Categories

Secured2 CorporationMinneapolis startup Secured2 has formed a partnership to incorporate new data security technology into Microsoft’s suite of products.

The first phase of the Secured2 solution for Microsoft will be a Q2 2016 app launch for Outlook — the email client with 60 million active users that send and receive 100 billion emails daily.

CEO Daren Klum says the the Secured2 security software will then extend beyond Outlook to Office 365 and ultimately OneDrive, potentially becoming an integrated part of the Windows OS if all goes as planned.   Their partnership consists of an API integration, cross marketing, and revenue sharing.

Read More »

Q&A With Jim Scullion, The New CEO of IoT/Endpoint Security Firm Great Bay Software

sourced

Categories

https://media.licdn.com/mpr/mpr/shrinknp_200_200/AAEAAQAAAAAAAAYuAAAAJDI3OTYzYzdhLWJjYjctNGMzYi04NzkyLTAzNTcwM2NjYjEzNA.jpgGreat Bay Software is a quiet story of Minnesota migration from the east coast.

In 2013, GrowthFire acquired the company and put Tim Butler in charge, planting a flag here in Minnesota.  Fast forward to February when Silicon Valley vet Jim Scullion became the CEO. Naturally, we reached out to learn more about this development and what’s in store for this transplant IoT/endpoint security firm.

What is the background of the company?

Steve Pettit & Jason Damron started the company in New Hampshire circa 2004.  Eventually they repositioned and changed the name to Great Bay Software as they saw the future opportunities around endpoint security.

Read More »

Post Navigation