This website uses cookies

Read our Privacy policy and Terms of use for more information.

This week's issue is backed by SafetyCLI, Drata, and Delinea.

Hope you had a great weekend!

I’m not sure if I’m really bad at scheduling meetings of similar types, or if more startups are converging on the mean. I’ve been talking to an increasing number of startups, all focused on securing agent interactions and Computer Use at runtime. The crazy thing is, they’re all doing it from different angles. There is no clear, winning, happy path yet, and there are more risks than we can shake a stick at.

At the same time, much of the AI/Agentic work I’m seeing at companies focuses on accelerating existing processes designed for humans. While Agents can make some improvements, it's also too easy to create "Bad Decisions at Machine-Speed" (this would be a sick band name).

While process design is a different issue, the whole conversation and evolution around AI Agents have been incredibly fast-moving, and as the capabilities and integration points of agents and AI systems have grown, the need for observability, runtime security checks, and adversarial testing has never been more important.

And as the hype around Mythos "solving" cybersecurity begins to fade, and newer foundational models with comparable cyber abilities emerge, along with open-source models performing as well or better, the world is increasingly aware of a long-standing truth among cyber practitioners. The real challenge in cybersecurity has never been merely identifying vulnerabilities in code, but understanding the motivations behind how businesses and people respond. AI is simply making this friction much more visible now.

What a time to be alive!

PARTNER

Your Developers Installed 47 AI Tools. You Don't Know About Any of Them.

Real-time visibility and governance for AI-driven developer workstations.

Developers are onboarding AI assistants, MCP servers, IDE extensions, and open source packages faster than any security review can keep up with. Every install is a potential entry point — and traditional EDR wasn't built to see inside pip, npm, or Claude Code.

Safety deploys silently across macOS, Windows, and Linux to give you a live inventory of every package, extension, AI tool, and MCP server on every dev workstation. Malicious and unapproved installs get blocked before they land, with zero friction for developers and no tool changes required.

Close the governance gap that agentic coding opened.

😎 Vibe Check

Click the options below to vote on whether you are a practitioner, founder, or investor. Feel free to leave a comment, and I'll feature the best takes in next week’s write-up!

What's happening with the cyber budget in 2026 at your company?

Login or Subscribe to participate

Last issue’s vibe check:
AI is already writing code, reviewing it, and triaging alerts. Where do you still insist on a human gate?
🟩🟩🟩🟩🟩🟩 Sign off on critical points like AuthN/AuthZ
🟨🟨🟨⬜️⬜️⬜️ Live incident response calls
⬜️⬜️⬜️⬜️⬜️⬜️ Threat modeling critical systems
🟨🟨🟨🟨⬜️⬜️ Honestly, humans are the bottleneck now

Very interesting split last week on the vibe check.

Signing off on critical points like authentication (AuthN) and authorization (AuthZ) is where people felt that humans still needed to be firmly in the loop. There’s nuance here, and I liken it to penetration testing. Not all findings are created equal, and context, reachability, integration points, etc., are important factors. There are levels to this!

Threat modeling via AI received the fewest votes. This makes a lot of sense given that several new startups are popping up in this space, and that it is one of the most consistently called-out parts of security that is very hard to scale. Pack this one up, folks, and let the AI do it. 🤝

An up-and-coming area I see a lot of promise in is the use of AI in incident response and forensic capture processes. So much potential here, but these are high-stakes situations that could wind up in court, so you’ve really got to use it where it counts and tread lightly.

Some of the top comments from last week’s vibe check:

💬 “It’s not just that humans are the bottleneck with AI now, it’s that we’re trying to apply AI to human-designed processes and systems. The sooner we move away from that construct, the better.”

🔭 Zooming Out

Stories hidden in the numbers

  • Cyber Taking Flight - Airbus (yes, that one) has acquired yet another security company. Now, it’s a huge business that does more than just make airplanes (my personal favorite on long-haul flights), but Airbus has been quietly pulling off a vertical integration play for a few years now. It’s been building a captive cyber arm for its own defense and government customers and creating a complementary layer of “European-owned” cyber capabilities.

💰 Market Summary

Private Markets

  • 10 companies from 3 countries raised $128.7M across 9 unique categories

  • Average deal size was $12.9M (median: $6.0M)

  • 97% of disclosed funding was for product companies

  • 7 companies from 5 countries were acquired across 7 unique categories

  • 71% of acquired companies were product companies

Public Markets

  • No public cyber companies had an earnings report last week

📸 YoY Snapshot

Rolling 13-week charts that compare funding and acquisitions week over week, year over year, comparing 2025 to 2026.

While the delta looks stark when comparing last week to the same week in 2025, the reality is that 2026 saw an earlier announcement spike because RSA was a few weeks earlier this year (shoutout to the Easter Bunny). In 2025, the RSA Conference was held from April 28 to May 1, so the week prior was full of the pre-RSA hype one would expect.

M&A, on the other hand, continues to care not about the industry’s timing (or even the Easter Bunny, for that matter). Volume is up ~15% over last year during the same timeframe.

PARTNER

How Leading CISOs Are Building Continuous Compliance

Discover how automation transforms compliance into a continuous advantage.

Compliance isn’t a once-a-year task anymore.

As regulatory scrutiny intensifies and cyber threats evolve, compliance leaders are rethinking how they manage risk and maintain assurance across frameworks.

The CISO Guide to Continuous Compliance explores a modern, automation-driven approach that enables organizations to stay audit-ready year-round.

🧩 Funding By Product Category

  • $72.0M for Software Supply Chain Security across 1 deal

  • $26.0M for Threat and Risk Prioritization across 2 deals

  • $12.6M for Secure Access Service Edge (SASE) across 1 deal

  • $6.0M for Threat Intelligence across 1 deal

  • $6.0M for Security Awareness across 1 deal

  • $3.0M for Professional Services across 1 deal

  • $2.5M for Red Teaming across 1 deal

  • $375.0K for Penetration Testing across 1 deal

  • $200.0K for Continuous Threat Exposure Management (CTEM) across 1 deal

🏢 Funding By Company

Product Companies:

Service Companies:

SEC filings may reflect partial or interim fundraising and can understate the final round numbers.

🌎 Funding By Country

  • $72.0M for the United Kingdom across 1 deal

  • $49.7M for the United States across 8 deals

  • $7.0M for Israel across 1 deal

🤝 Mergers & Acquisitions

Product Companies:

  • Armour Communications, a United Kingdom-based secure collaboration and encrypted messaging platform, was acquired by PentenAmio for an undisclosed amount. Armour Communications had previously raised $2.2M in funding. (more)

  • Cryptovision, a Germany-based cryptography and PKI platform, was acquired by Atos for an undisclosed amount. Cryptovision has not previously disclosed funding. (more)

  • QUARKS LAB, a France-based application security platform focused on code integrity, encryption, and anti-tampering, was acquired by Airbus for an undisclosed amount. QUARKS LAB has not previously disclosed funding. (more)

  • Ryft, a United States-based open-source data lake platform for AI agents, was acquired by Cyera for an undisclosed amount. Ryft has not previously disclosed funding. (more)

  • VISO Trust, a United States-based third-party vendor risk management platform, was acquired by Protecht for an undisclosed amount. VISO Trust had previously raised $21.0M in funding. (more)

Service Companies:

  • ImagineX's Cybersecurity Business, the cybersecurity consulting business unit of the ImagineX digital services firm, was divested and acquired by TekStream Solutions for an undisclosed amount. ImagineX will continue to operate its core divisions, and the cybersecurity business has not previously disclosed funding. (more)

  • IOvations, a United States-based managed security services provider (MSSP), was acquired by Alchemy Technology Group for an undisclosed amount. IOvations has not previously disclosed funding. (more)

📚 Great Reads

  • The Token Threshold - Every software product now has an invisible line. Is your Buyer actually an Agent?

  • *Nothing happening is everything in identity security - See how Delinea’s identity security platform works quietly in the background—reducing risk, cutting alert noise, and enabling real-time access decisions so your business runs smoothly, securely, and without interruption.

  • Project Glasswing and the Soft Underbelly Problem - Project Glasswing is good work, and the industry needed it, but now the harder question to answer is what happens when these same capabilities point at the parts of the internet nobody watches?

*A message from our partners

🧪 Labs

The ‘s’ is silent

Reply

Avatar

or to participate

Keep Reading