Deloitte & Touche Buys Threat-Hunting FirmDeloitte & Touche Buys Threat-Hunting Firm
Root9B (R9B) offers threat hunting and other managed security services.
January 26, 2021
Deloitte & Touche has purchased most assets of cyber threat-hunting services firm Root9B (R9B), which now will be part of Deloitte's Detect and Respond service offering for clients.
R9B provides threat hunting and detection managed services as well as vulnerability assessment, penetration testing, forensics and incident response, and training for threat hunters and defenders. Financial details of the acquisition were not disclosed.
"Commercial and government entities contend with cyber adversaries who use incredibly sophisticated technology to penetrate legacy defenses and take advantage of expanding attack surfaces," said Deborah Golden, Deloitte Risk & Financial Advisory Cyber and Strategic Risk leader and principal, in a statement. "The addition of R9B's business will expand our complement of skilled cyber professionals and leading technologies, while also offering our clients an advantage against adversaries. Our newly combined powerful and innovative solutions for preventing, detecting and mitigating cyber threats are unlike anything we've seen available in today's market."
Eric Hipkins, founder and CEO of R9B, said the deal is the "next logical step" for his firm. "At Deloitte, we'll be able to accelerate scaling and development of offerings we consider vital to proactive cyber threat hunting and remediation," he said in a statement.
Read more here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
5 Reasons To Move your PKI Deployment to the Cloud