• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Empirical Security combines the power of global threat intelligence with localized, organization-specific insights delivering highly accurate threat prioritization based on the specific context of the organization

July 21, 2025 //  by Finnovate

Cybersecurity startup Empirical Security raised $12 million in new funding to develop and deploy custom artificial intelligence cybersecurity models tailored to each organization’s unique infrastructure and threat landscape. Empirical’s platform offers dual-model architecture that combines the power of global threat intelligence with localized, organization-specific insights. The models are trained on about 2 million daily exploitation events sourced from internet-scale datasets, while local models are fine-tuned using customer-provided and curated internal data. That, delivers highly accurate threat prioritization based on the specific context of the organization. The approach is designed to allow cybersecurity teams to make faster, evidence-based decisions, backed by predictive models that highlight the most critical vulnerabilities. The idea is that instead of relying on generic risk scores that may not reflect the actual danger to a specific business, the company’s local models provide actionable intelligence customized to a given company’s operational environment. Empirical also emphasizes explainability and decision support as key elements of its platform. The platform gives security leaders the ability to justify their strategies with data by integrating risk-based analysis with measurable prediction outputs. The transparency is especially valuable in boardroom discussions, compliance reporting and budgeting, where clear articulation of cybersecurity priorities is essential.

Read Article

 

Category: Cybersecurity, Innovation Topics

Previous Post: « Cyabra detects deepfakes using spatio-frequency analysis to detect invisible pixel inconsistencies, and identifies unnatural movement patterns and lip-sync errors across video frames
Next Post: Wyoming tests use of state-issued stablecoin for real-time payments to government contractors »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.