22 April 2026 – By Renny McPherson
Thanks to Skillbridge Fellow Capt Kevin Uebelhardt, USMC for research support
Today we announce our lead investment in SCATR’s Series A financing. Cybersecurity has largely focused on data at rest and data in use. But sensitive data doesn’t sit still—it moves. Across cloud environments, across tactical networks, across infrastructure that is often untrusted, contested, or observable.
That’s the gap.
Once a system is authenticated under Zero Trust, the data itself is still exposed in transit—vulnerable to interception, analysis, and increasingly, long-term collection. The rise of “harvest-now, decrypt-later” only compounds this. Adversaries don’t need to break encryption today if they can store it and wait.
SCATR is built around a simple but powerful premise: if data can’t be collected, it can’t be exploited.
Their platform doesn’t secure a single pathway—it eliminates the concept of one. Data is fragmented, encrypted with post-quantum standards, and dynamically routed across multiple paths simultaneously. To an outside observer, it doesn’t resemble sensitive traffic at all. It looks like noise. There is no full stream to intercept, no pattern to analyze, no payload to reconstruct.
This is a fundamentally different approach to network security, and one that feels increasingly necessary as environments become more distributed and more contested.
What stood out to us wasn’t just the technical architecture, but where it’s already being used. SCATR has been operationalized across joint force commands and deployed in real-world exercises and environments where failure isn’t theoretical. That kind of validation is hard to replicate and even harder to shortcut.
The team consists of seasoned experts who have conceptualized, built and sold a previous company that served the world’s most demanding customers in both defense and finance.
SCATR”s use case, rightly focused on defense, is now expanding. As AI infrastructure scales, the movement of high-value data—model weights, training pipelines, inference outputs—becomes a critical vulnerability. The same principles that make SCATR effective in contested military environments apply directly to securing commercial systems at scale.
We spend a lot of time looking for companies operating at structural inflection points—where a problem shifts from edge case to inevitability. Securing data in transit is one of those shifts.
SCATR is not just improving existing architecture. They are defining and securing a missing layer. We are grateful to be their partners for the continuing journey.