{"id":47980,"date":"2022-08-11T18:00:00","date_gmt":"2022-08-11T18:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight"},"modified":"2022-08-11T18:00:00","modified_gmt":"2022-08-11T18:00:00","slug":"supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/","title":{"rendered":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight"},"content":{"rendered":"<p>BLACK HAT USA 2022 &#8212; Las Vegas \u2014 At an intimate stage area in the Innovation City section located at the back of the Business Hall, Phylum beat out three other cybersecurity startups to take the title at the inaugural Innovation Spotlight competition, held on Wednesday evening at the 25th Black Hat USA.<\/p>\n<p>The four finalists were <a href=\"https:\/\/www.phylum.io\/\" target=\"_blank\" rel=\"noopener\">Phylum<\/a>, a software supply chain security company; <a href=\"https:\/\/www.keycaliber.com\/#\/\" target=\"_blank\" rel=\"noopener\">KeyCaliber<\/a>, a company that uses asset behavior analytics to help clients prioritize protective measures; <a href=\"https:\/\/normalyze.ai\/\" target=\"_blank\" rel=\"noopener\">Normalyze<\/a>, which identifies sensitive data and vulnerable access paths ripe for exploitation; and <a href=\"https:\/\/www.tromzo.com\/\" target=\"_blank\" rel=\"noopener\">Tromzo<\/a>, with a product security operating platform (PSOP) for building applications more securely.<\/p>\n<p>Dark Reading&#8217;s editor-in-chief, Kelly Jackson Higgins, hosted the awards. Judges picked finalists back in July&nbsp;after viewing&nbsp;video submissions from candidates &#8212;&nbsp;companies that were&nbsp;2 years old or less and had fewer than 50 employees.<\/p>\n<h2 class=\"regular-text\">The Final Four<\/h2>\n<p>The finalists presented in alphabetical order, starting with KeyCaliber. <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/attackers-aren-t-invincible-we-must-use-that-to-our-advantage\" target=\"_blank\" rel=\"noopener\">Roselle Safran<\/a>, cofounder and CEO, explained how her company&#8217;s analytics engine helps continuously identify and protect an organization&#8217;s most valuable data, aka &#8220;crown jewels&#8221; \u2014 indeed, the company&#8217;s brand representatives were men dressed in royal robes and costume crowns. Safran said KeyCaliber&#8217;s software can run on her company&#8217;s network, on the customer&#8217;s network, or on premises, a flexibility that meets prospective clients&#8217; need to balance resources and security.<\/p>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"u7hgvfx2hlbu\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"blt9f64a41d29e67697\" alt=\"keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg\">\n<\/picture><figcaption>KeyCaliber&#8217;s two kings. (Photo by Karen Spiegelman for Dark Reading)<\/figcaption><\/figure>\n<p>Next up was Normalyze cofounder and CEO Amer Deeba. His company is in a similar risk management space as KeyCaliber, but emphasizes &#8220;holistic data security&#8221; rather than crown jewels. The company offers &#8220;data-first cloud security&#8221; that scans for sensitive data on Google Cloud, AWS, and Microsoft Azure. His co-founder, CTO <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/api-first-3-steps-for-building-secure-cloud-apps\" target=\"_blank\" rel=\"noopener\">Ravi Ithal<\/a>, was standing to the side recording his partner&#8217;s presentation, in a perfect example of the supportive atmosphere of the event.<\/p>\n<p>The specter of Log4j hung over the presentations, none more so than Phylum&#8217;s. Cofounder and president Peter Morgan said his company focuses on the security of <a href=\"https:\/\/www.darkreading.com\/application-security\/hundreds-of-open-source-components-could-undermine-security\" target=\"_blank\" rel=\"noopener\">open source packages<\/a>, using deductive analysis of risk indicators to create what he likened to a &#8220;credit score for packages.&#8221; The company offers a community edition that has &#8220;feature parity&#8221; with the paid edition, limiting it to one user and five projects at a time. He said the automated analysis takes 12-15 minutes to complete. &#8220;We&#8217;re walking really well, and the system is learning to run as we speak,&#8221; Morgan said.<\/p>\n<p>The last to present was Harshil Parikh, CEO and cofounder of Tromzo, a product security operating platform designed to make the entire software development pipeline more secure. In response to a question from the judges, Parikh explained that the company wrote its own <a href=\"https:\/\/www.darkreading.com\/edge-articles\/you-can-t-opt-out-of-citizen-development\" target=\"_blank\" rel=\"noopener\">no-code platform<\/a> for automating security processes and remediation.<\/p>\n<h2 class=\"regular-text\">The Winners<\/h2>\n<p>First, all four finalists were winners in that they got booth space at Black Hat USA, as well as a receptive audience for their presentations and a consultation with an Omdia analyst. There were decision-makers in the audience Wednesday, with a few CEOs filling the seats and a standing-room crowd watching the competition.<\/p>\n<p>Tromzo definitely had the flashiest presentation. Parikh opened by using a DVD as a prop to illustrate the outdated former cutting-edge technology. He closed by tossing the DVD over his shoulder, warning, &#8220;Don&#8217;t get left behind.&#8221; That jazz might be why Tromzo took first place in the audience poll.<\/p>\n<p>Ultimately, however, the opinions that mattered most in the contest were those of the judges, and they favored the open source-emphasizing Phylum. The seven judges were Ketaki Borade, senior analyst in Omdia\u2019s Infrastructure Security research practice; Trey Ford, deputy CISO at Vista Consulting Group; Hollie Hennessy, senior analyst in Omdia&#8217;s IoT cybersecurity practice; Maria Markstedter, founder and CEO of Azeria Labs; Lucas Nelson, founding partner at Lytical Ventures; Robert J. Stratton III, principal &amp; strategist at Polymathics and venture partner at Nextgen Venture Partners; and Rik Turner, principal analyst in Omdia&#8217;s IT security and technology team.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/risk\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Up-and-coming companies shoot their shot in a new feature introduced at the 25th annual cybersecurity conference.Read More <a href=\"https:\/\/www.darkreading.com\/risk\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47980","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-11T18:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight\",\"datePublished\":\"2022-08-11T18:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/\"},\"wordCount\":680,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f64a41d29e67697\\\/62f4a6e273936f0ecaa966d3\\\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/\",\"name\":\"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f64a41d29e67697\\\/62f4a6e273936f0ecaa966d3\\\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2022-08-11T18:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f64a41d29e67697\\\/62f4a6e273936f0ecaa966d3\\\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f64a41d29e67697\\\/62f4a6e273936f0ecaa966d3\\\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-11T18:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight","datePublished":"2022-08-11T18:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/"},"wordCount":680,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/","url":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/","name":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2022-08-11T18:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f64a41d29e67697\/62f4a6e273936f0ecaa966d3\/keycaliber-kings-Karen_Spiegelman-bhusa2022-sm.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Security Startup Phylum Wins the First Black Hat Innovation Spotlight"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47980"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47980\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}