Cybersecurity Private Equity

Cyber TRUST™ Index

-2.8%

One day change

+40.9%

Change from Jan 2024

Lisa Donnan

Lisa Donnan
tech design layout

O3V Partner Lisa Donnan Featured in GMU Engineering Article

This article was originally published on gmu.edu on 08/02/20 – As Mason Engineering’s enrollment and research continue their upward trajectory and the School of Computing prepares to launch, the engineering school’s advisory board is actively supporting Dean Ken Ball and the administration. “It’s an exciting time to be at the Volgenau School of Engineering (VSE),” says Lisa Donnan, the advisory board’s new chair and […]

O3V Partner Lisa Donnan Featured in GMU Engineering Article Read More »

Cyberattack from hacker

Cyberattacks as a Form of Power [Cybersecurity Brief]

As cyberattack levels increase on the daily, one must ponder: what is the motivation for these hackers? After brainstorming all the possibilities, power comes to mind. Once a hacker is successful, they immediately have power over the vulnerable party no matter if the original goal was to gain money or access confidential information. Articles by

Cyberattacks as a Form of Power [Cybersecurity Brief] Read More »

IoT Security Challenges

7 Critical IoT Security Challenges (And What’s Being Done To Combat Them)

You probably already rely on Internet of Things (IoT) devices, whether you realize it or not. They could be helping control and monitor your public water usage, they might help you log into your email on the go– whatever their purpose, most of us rely on IoT devices to help make our lives easier. And

7 Critical IoT Security Challenges (And What’s Being Done To Combat Them) Read More »

Futuristic roadway

Reaching Consensus that Cybersecurity Policy & Leadership Are Required [Cybersecurity Brief]

With conflicts surrounding racism, inequality, and the current pandemic, it seems as though America is in a state of chaos. Barely anything can be agreed upon, leaving our country in a stagnant state. However, as important systems and networks continuously get hacked, U.S. officials can finally agree on one topic: cybersecurity. Articles by Bob Fredericks

Reaching Consensus that Cybersecurity Policy & Leadership Are Required [Cybersecurity Brief] Read More »

servers behind tech back drop

Protecting Our Nation’s Critical Cyber Infrastructure

Internet security has been a question for as long as the internet has existed. Our nation depends on the internet to protect our most vital and confidential information in order to preserve our way of life, yet recent security breaches, phishing, malware, and other relatively common cybersecurity problems have shown that our critical cyber infrastructure

Protecting Our Nation’s Critical Cyber Infrastructure Read More »

global cybersecurity groth

Global Cybersecurity Growth [Cybersecurity Brief]

More often than not, cybersecurity is discussed on a personal level. For example, businesses aim to have secure systems, individuals want to keep their data protected, and so on. What many people do not realize is that cybersecurity reaches global heights. The need for secure systems goes beyond personal devices, company databases or credit card

Global Cybersecurity Growth [Cybersecurity Brief] Read More »

hacker hacking into peoples stuff

Avoiding a Cyber-Criminal Pay Day [Cybersecurity Brief]

A cyber-criminal gets its pay day when a system is successfully hacked. Payment can come in the form of personal information, confidential documents and even digital money. With cyber-attacks at an all-time high, organizations must be doing everything in their power to take precautionary measures towards avoiding hackers. Articles by Maggie Miller from The Hill,

Avoiding a Cyber-Criminal Pay Day [Cybersecurity Brief] Read More »

veracity raising funds from investors

Veracity Industrial Networks Announces New Investors and Focus on Industrial IoT Cybersecurity

ALISO VIEJO, Calif. – June 30, 2020 — Veracity Industrial Networks, a developer of Industrial Software Defined Network (SDN)-based technology for operational networks, today announced a new seed round of funding, backed by existing investors Schweitzer Engineering Laboratories (SEL) and Option3Ventures, with new strategic investments from DYNICS, Inc. and Interstates, Inc.     DYNICS, Inc., and Interstates,

Veracity Industrial Networks Announces New Investors and Focus on Industrial IoT Cybersecurity Read More »

handshake

Protecting American’s Digital Footprints [Cybersecurity Brief]

This week’s cyber news has proven one thing: U.S. citizens need to get educated on the importance and inner workings of cybersecurity. In the age of social media, news can spread like wildfire, whether it is true or false. Articles by Davey Winder from Forbes, Steven Melendez from Fast Company and Zachary Cohen in combination

Protecting American’s Digital Footprints [Cybersecurity Brief] Read More »