Futurum Group partners with cybersecurity mogul Shira Rubinoff for new venture

February 8, 2024
1 min read

The Futurum Group, a technology advisory firm, has acquired and merged the cybersecurity brand assets of Shira Rubinoff. As part of the deal, The Futurum Group has launched a cybersecurity practice called ‘Cybersphere’, with Rubinoff as President. The acquisition includes Rubinoff’s video series, interview shows, advisory roles, and consulting activities. Rubinoff will be responsible for developing market intelligence, creating content featuring industry thought leaders, and leading the firm’s initiatives at industry events.

The acquisition of Rubinoff’s platform will allow The Futurum Group to offer more cutting-edge data, strategic advisory services, and a platform for industry leadership, said Daniel Newman, CEO of The Futurum Group.

Rubinoff will focus on serving chief information security officers (CISOs) by providing access to critical tools to understand and cope with vulnerabilities. The CISO role has evolved significantly in recent years, and CISOs are under immense pressure from leadership, regulators, and cyber threats, according to Rubinoff.

The Futurum Group is a technology research, intelligence, media, and advisory firm that covers twelve major technology sectors, including AI, data analytics, cloud, telecom, security, and sustainability. Rubinoff is a recognized cybersecurity executive, advisor, and author, and has built two cybersecurity product companies.

Latest from Blog

Top 3 Cybersecurity Stocks for May 2024 Buy Now

TLDR: Key Points: Cybersecurity stocks are using AI to enhance their platforms Top cybersecurity stocks to buy now include Crowdstrike, Fortinet, and Palo Alto Networks Article Summary: The cybersecurity market is booming

Get Secure: Know the Basics of Cloud Security Fundamentals Now

TLDR: Cloud security fundamentals are essential for data protection, regulatory compliance, and access management in a cloud environment. Key fundamentals include identifying assets, implementing security controls, conducting risk assessments, managing user access