Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Cornami Raises $68 Million for Quantum Secure Computing on Encrypted Data

Cornami, a company that helps organizations encrypt data to keep it safe from post-quantum threats, this week announced that it has raised $68 million in an oversubscribed Series C funding round. To date, the company has raised over $150 million.

Cornami, a company that helps organizations encrypt data to keep it safe from post-quantum threats, this week announced that it has raised $68 million in an oversubscribed Series C funding round. To date, the company has raised over $150 million.

The new funding round was led by SoftBank Vision Fund 2, with participation from Impact Venture Capital, Octave Ventures, Applied Ventures, and existing investors.

Founded in 2012, the Campbell, California-based Cornami offers a software-defined TruStream Computational Fabric architecture designed to enable high-performance real-time computing for critical and complex applications.

According to Cornami, its technology can deliver scaled performance for massive datasets, helping organizations accelerate Fully Homomorphic Encryption (FHE), to keep data protected from post-quantum threats.

By supporting operations on encrypted data, FHE offers a solution for decryption of data during use, thus reducing the risk of data breaches even if the environment has been breached. FHE is computationally intensive, but Cornami says its solution enables the processing of encrypted data in real-time at low cost.

“Cornami’s technology has a unique ability to address today’s real-time high performance computing requirements along with programming flexibility for large growing markets like cybersecurity, artificial intelligence, and cloud computing,” Jack Crawford, founding general partner of Impact Venture Capital, said.

Related: devOcean Emerges From Stealth With Cloud-Native Security Operations Platform

Related: Application Security Firm StackHawk Bags $20.7 Million in Series B Funding

Advertisement. Scroll to continue reading.

Related: Email Security Firm Abnormal Security Raises $210 Million at $4 Billion Valuation

Related: Zero Trust VPN Company Tailscale Raises $100 Million

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.