1. SentinelOne's earnings call highlights the focus on AI and automation; 2. Revenue growth shows a gradual deceleration, but fundamentals remain strong with positive EBITDA and UCFC margins; 3. Valuation is attractive compared to peers with higher growth potential and upcoming profitability inflection.
Recent #cybersecurity news in the semiconductor industry
1. Palo Alto Networks is aggressively targeting the $30 billion SIEM market, aiming to capture significant market share from legacy vendors like Splunk and Microsoft. 2. The company's platformization strategy and recent SIEM-focused acquisition are expected to accelerate its path to a $15 billion ARR target, supporting a Buy rating. 3. Management aims to become a top 3 player in the SIEM market within 24 months, leveraging its successful XDR market penetration.
➀ A Tesla Cybertruck filled with explosives exploded outside Trump Tower in Las Vegas; ➁ Elon Musk confirmed the explosion was caused by fireworks or a bomb, not a vehicle malfunction; ➂ The incident is under investigation, with potential links to a New Orleans attack.
➀ Hacker Thomas Lambertz demonstrates the vulnerability of patched Windows 11 BitLocker; ➁ Attack can be executed with a single physical device access and network connection; ➂ Fix is only surface-level, with UEFI firmware storage limitations affecting future Secure Boot certificates.
➀ Ukraine is set to become one of the first countries in the world to receive satellite-to-smartphone service following an agreement with Elon Musk and Kyivstar, a Ukrainian mobile operator. ➁ The service will utilize modems on Starlink satellites to beam signals to handsets, with a messaging service expected to begin in Q4 2025. ➂ Starlink has already provided military communication services to Ukraine since 2022, and the new service is seen as a sign of continued U.S. government support for Ukraine.
➀ Intel's shift to a more transparent strategy in technology announcements; ➁ The competition between Intel's PowerVia and TSMC's Super Power Rail; ➂ Andy Grove's philosophy of maintaining a 'healthy amount of paranoia'.
➀ The Honey extension has been revealed as a scam; ➁ It diverts affiliate marketing funds from partners; ➂ It misleads consumers.
➀ The article commemorates the passing of Gordon Mah Ung, a respected technology journalist; ➁ The author reflects on the impact Gordon had on the technology industry and the personal regret of not expressing gratitude; ➂ The author mentions the importance of expressing gratitude and the family's philanthropic focus on pancreatic cancer research.
➀ Arm在诉讼中未能获得其最想要的结果,即禁止高通在PC芯片组中使用Nuvia设计的基于Arm的核心;➁ 虽然陪审团未能就Nuvia是否违反了与Arm的许可条款达成一致意见,但Arm有机会进行重审;➂ 高通律师出示了一份由Arm首席执行官撰写的策略文件,其中设想Arm建造自己的芯片,这可能是Arm业务模式的一个重大转变。
➀ Australian computer scientist Craig Wright falsely claimed to have invented Bitcoin and was sentenced for contempt of court. ➁ Wright's lawsuit against Jack Dorsey's company, Block, was dismissed. ➂ Wright was sentenced to a suspended one-year prison term for lying and forging documents.
➀ Compute Express Link (CXL) technology is expected to move from a niche to mainstream use in 2025; ➁ CXL's support for memory expansion is a significant driver, with various server and memory solutions now available; ➂ CXL 2.0 and future generations of PCIe/CXL will enable more advanced use cases like switching and dynamic memory allocation.
➀ The risks of sharing personal information online; ➁ The dangers of scam calls and texts; ➂ How Surfshark's Alternative Number and Alternative ID tools can protect your privacy.
➀ TrustInSoft specializes in advanced software analysis tools for formal verification of C and C++ code; ➁ The company's tools significantly reduce time spent on bug detection and verification; ➂ TrustInSoft uses formal methods to ensure safety, security, and reliability in software.
➀ Crypto Quantique has upgraded its QuarkLink IoT platform with a hybrid post-quantum cryptographic algorithm; ➁ The platform reduces the time and expense of implementing security functions in embedded devices by up to 10X; ➂ The hybrid key encapsulation mechanism combines X25519 with Kyber (ML-KEM) for both current and future security.
➀ Scientists and engineers from UKAEA and the University of Bristol have created the world's first carbon-14 diamond battery; ➁ The battery leverages the radioactive isotope carbon-14 to produce a diamond battery with a potential lifespan of thousands of years; ➂ The technology could be used in medical devices and extreme environments, providing continuous power for decades.
➀ A class-action lawsuit alleges that UnitedHealthcare uses a faulty algorithm to deny patient coverage, filed by two now-deceased individuals. ➁ UnitedHealthcare CEO Brain Thompson was killed in Midtown Manhattan earlier this week, and the suspect is currently on the run. ➂ The lawsuit claims UnitedHealthcare pushed employees to use an algorithm with a 90% error rate to deny coverage.
1. SentinelOne stands out in the cybersecurity sector for its innovative AI-driven endpoint security and rapid scaling, despite a high optical valuation. 2. S is expected to achieve positive EBITDA and cash flow in 2025 at a faster pace than peers like Palo Alto and CrowdStrike. 3. With a projected 59% and 60% cash earnings growth in 2025 and 2026, the Company's valuation is relatively inexpensive at 1.0x PEG.
➀ Elon Musk files an injunction against OpenAI and its CEO to prevent the company from becoming for-profit; ➁ Musk argues that OpenAI has deviated from its original non-profit mission; ➂ The case will be heard in January in California.
➀ Two internet cables between Sweden and Finland suffered damage, one caused by construction and the other under investigation; ➁ The incident highlights the vulnerability of communications cables and the potential for global internet chaos; ➂ While the damage is not related to tensions between Russia and NATO, it raises concerns about cybersecurity and the importance of undersea cables.
➀ The rise of RISC-V cores and the challenges of certification; ➁ The role of Breker Verification Systems in the certification process; ➂ The complexity of certifying RISC-V ISA implementations and the efforts of RISC-V International.