
TechCrunch Startup News Fig Security emerges from stealth with $38M to help security teams deal with change; plus, Cursor has reportedly surpassed $2B in ARR
Mar 3, 2026
A new security tool traces data lineage across complex stacks and alerts teams when upstream changes weaken detections. The conversation covers simulations that test detection integrity and integrations with SIEMs and other tools. Also discussed is rapid revenue growth at a developer tooling firm and how market competition and customer mix are driving valuation chatter.
AI Snips
Chapters
Transcript
Episode notes
Data Lineage Reveals Fragile Detection Chains
- Modern security stacks are fragile because small upstream changes can silently break downstream detection and response capabilities.
- Fig traces data lineage from sources through pipelines to SOAR/SIEM and alerts in real time when inconsistencies appear.
Reverse Tracing From Detections To Data
- Fig's approach flips the usual flow by starting from detections and backtracing what data must look like to trigger them.
- The platform samples live data through each tool to build lineage and identify where upstream changes break detections.
Simulate Changes Before You Deploy
- Simulate fixes, patches, or config changes before deployment to predict their impact on detection and response.
- Fig provides pre-deployment simulation across the data pipeline so teams can see downstream effects in advance.
