• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Minimus platform reduces cloud software vulnerabilities by building container images directly from upstream project sources and including only the essential components needed to run applications

April 30, 2025 //  by Finnovate

Application security startup Minimus  has raised $51 million in an exceptionally large seed round to support the rollout of its platform, which claims to eliminate 95% of software supply chain vulnerabilities. Minimus offers a solution that is said to radically reduce cloud software vulnerabilities. The company’s platform transforms application security by breaking free from the cycle of detection, triage and remediation, allowing chief information security officers and developers to entirely avoid nearly all vulnerabilities. Minimus offers secure, minimal container images and virtual machines that seamlessly replace existing artifacts anywhere in the development workflow. Requiring only a single change to deployment configurations, the Minimus platform can help organizations realize an immediate decrease in vulnerability exposure, vastly accelerating remaining remediation efforts. Under the hood, Minimus builds images directly from upstream project sources, including only the essential components needed to run applications. The methodology reduces the attack surface, providing a lightweight, secure alternative to traditional development artifacts that doesn’t disrupt existing workflows or tools. The platform also integrates real-time threat intelligence to give developers and security teams insights into active exploits and vulnerability metrics, including Exploit Prediction Scoring System metrics and Cybersecurity and Infrastructure Security Agency Known Exploited Vulnerabilities. Doing so allows teams to focus their efforts on the small fraction of remaining risks, streamlining prioritization and significantly improving operational efficiency.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Google’s Android devices would be able to include SIM in backups in addition to contacts, call history, device settings, apps & app data, SMS & MMS, potentially making it that much easier to swap phones
Next Post: Bugcrowd’s crowdsourced red teaming as a service RTaaS connects customers with a global network of vetted, trusted ethical hackers tailored to needs, budgets and organizational maturity »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy