Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

05:30 PM
Dark Reading
Dark Reading
Products and Releases

CISO-Led Group Invests In API Security Firm Traceable

SAN FRANCISCO, Calif. -- February 11, 2020 -- Traceable, the world’s first end-to-end application security monitoring platform, today announced a strategic partnership with Silicon Valley CISO Investments (SVCI), an angel syndicate of 55+ practicing CISOs that back innovative cybersecurity startups. Investors will offer Traceable capital and invaluable strategic counsel. 

Founded by serial entrepreneur Jyoti Bansal and engineering executive Sanjay Nagaraj, Traceable launched from stealth in the third quarter of 2020 and has experienced significant customer momentum as enterprises seek new ways to secure their APIs and cloud-native applications, preventing inadvertent data leaks and next-generation cyberattacks. As Traceable scales, SVCI’s unique approach to investing in startups and on-the-ground support will be instrumental in the company’s continued growth. 

SVCI hand picks standout organizations to support and work closely with on everything from operations and product roadmaps to pricing and marketing initiatives. Unlike traditional VC firms, SVCI doesn’t take board seats and takes pride in its hands-on approach to growing early-stage companies.

“CISOs are the true experts in our industry and their investment in Traceable is incredibly validating,” said Jyoti Bansal, co-founder and CEO of Traceable. “As cloud-native architecture adoption soars, protecting modern distributed apps from increasingly sophisticated security attacks has become an immediate challenge. The SVCI CISO’s expertise and deep understanding of customer pain points is invaluable as we work to ensure all businesses have the tools at their disposal to properly protect their applications. We’re proud to partner with SVCI as they redefine what it means to be an investor.”

Traceable’s software helps protect APIs by using distributed tracing data and machine learning algorithms that can analyze application activity and alert when anomalous behavior is detected. According to Gartner, “IT organizations struggle to evolve their processes for developing, delivering and managing APIs for integration and digital business transformation.” Traceable is helping businesses overcome this blindspot. Businesses rely on Traceable’s rich forensic data and insights to identify attack attempts and easily perform root cause analysis. 

“SVCI’s mission is to empower and champion startups tackling the most complex challenges facing the cybersecurity market,” said Jonathan Jaffe, SVCI investor and CISO for Lemonade. “Traceable is pioneering how businesses can overcome API vulnerabilities and protect against a new class of attacks that can withstand Web Application Firewalls and Runtime Application Self-Protection measures. Its first-to-market technology and seasoned leadership sets it apart and makes the company a natural fit for SVCI’s portfolio.” 

"To learn more about SVCI and Traceable visit Traceable's latest blog post detailing a discussion with Lemonade CISO and SVCI investor, Jonathan Jaffe." 


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-13
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying th...
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
PUBLISHED: 2021-05-13
An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another serv...
PUBLISHED: 2021-05-13
Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.