Cyber Technology

Gula Tech Adventures Complete Portfolio Overview

all-logos
Since founding in 2017, Gula Tech Adventures has performed a variety of investments directly in cyber start-ups as well as cyber funds. This blog captures all companies across each of our funds and direct investments and is updated as needed. Some companies are listed in multiple categories.

Read More…

How do you monitor “East — West” Network Traffic?

0*r8a0VRvEElkOP_-1
If your organization does not have a strategy for monitoring network communications between each of the network nodes, you are potentially missing a wide variety of malicious lateral movement and not collecting forensics which could be analyzed after an attack. In this post I will examine what east-west traffic monitoring means, how various organizations are dealing with this problem.
Read More…