Application Security

12/29/2014
08:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail

20 Startups To Watch In 2015

Check our list of security startups sure to start (or continue) making waves in the coming year.
9 of 21

Farsight Security
Farsight Security  
Founded: 2013 
What it does: Threat intelligence 
Noteworthy player: Dr. Paul Vixie (founder) 
One of the pioneers in Internet and DNS technology, Dr. Paul Vixie is the thought leader behind this startup, which focuses on offering real-time passive DNS technology that provides contextual information for reputation and threat feeds. The idea is to help other vendors, researchers, and incident handlers reduce dreaded false positives to focus on actual threats being pinpointed by their threat feeds.
(Image: www.farsightsecurity.com)

Farsight Security

Founded: 2013

What it does: Threat intelligence

Noteworthy player: Dr. Paul Vixie (founder)

One of the pioneers in Internet and DNS technology, Dr. Paul Vixie is the thought leader behind this startup, which focuses on offering real-time passive DNS technology that provides contextual information for reputation and threat feeds. The idea is to help other vendors, researchers, and incident handlers reduce dreaded false positives to focus on actual threats being pinpointed by their threat feeds.

(Image: www.farsightsecurity.com)

9 of 21
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
SophieBOU
50%
50%
SophieBOU,
User Rank: Apprentice
1/14/2015 | 6:50:08 PM
Re: "Interesting" - perhaps. Startups?
The vast majority of startups don't "make it" within 3 years. Uber has been everyone's example of an especially successful startups until runins with regulation recently, so I'll use them as an example. They were founded in early 2009 and only got big last year, 5 years later. 

There's been much debate, but I'm most convinced by proponents of looking at whether any startup is truly doing something new and with limited resources (tech penchant not required).
GilesR588
50%
50%
GilesR588,
User Rank: Apprentice
1/14/2015 | 5:22:57 PM
3 words to address the world
what3words 

 

what3words is a giant grid of 57 trillion 3m x 3m squares that covers the entire globe.

 

Each square has been been given a 3 word address,  allowing people to find more accurately and communicate more quickly, any location on earth.

 

Poor addressing affects 75% of the world, over 135 counties. It is frustrating and costly in developed nations but life threatening and limits growth in developing ones. 
dnadir
50%
50%
dnadir,
User Rank: Apprentice
1/2/2015 | 4:54:57 PM
"Interesting" - perhaps. Startups?
I wish we had an agreed definition for "startups". Some of these companies are perhaps interesting, or "early stage" and some are what I'd consider successful leaders in a nascent space, but IMHO a "startup" is a new company with seed or perhaps new series A funding. A company 3+ years old with multiple rounds that is still small or a "startup" just sounds like they are struggling to me. 
varunopen
50%
50%
varunopen,
User Rank: Apprentice
1/2/2015 | 6:34:02 AM
Re: Vector Prevalence
very nice list of start ups
will.munroe
50%
50%
will.munroe,
User Rank: Apprentice
1/1/2015 | 9:15:57 AM
Re: Vector Prevalence
Ryan

There is no doubt Crowd Strike is a great product and it was a SINET winner.  They were next to Interset at the event.  As for application security - that is a crowded and fairly mature space, and Cloud Security is the opposite, nacent but it will have its day.  Most Forune 1000 security folks are slow to adopt the cloud while most security companies offer some form of cloud based solution.  My expirience with endpoints is that they are hard to manage for the security teams - often owned by another part of the CIO's team and already paralyzed by agents......

The hope is that by adding intelligence to the security equation we can get smarter at finding the threats we need to focus on - that is the goal of many of these companies and of the behavioral analytics players.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/31/2014 | 12:18:23 PM
Vector Prevalence
I am surprised that application security and cloud security are not more prevalent. I speculate that by 2016, cloud security will be everywhere due to the rapidly evolving landscape.

I have seen Crowd Strike's product first hand and can attest to it being a robust product. Real time threat mitigation from an endpoint perspective. I will be interested to get more acquainted with some of the other tool sets referenced in the article.
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
4 Tips to Protect Your Business Against Social Media Mistakes
Guy Bunker, CTO of Clearswift,  4/22/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-16558
PUBLISHED: 2019-04-25
Contao 3.0.0 to 3.5.30 and 4.0.0 to 4.4.7 contains an SQL injection vulnerability in the back end as well as in the listing module.
CVE-2018-18369
PUBLISHED: 2019-04-25
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for executi...
CVE-2018-19442
PUBLISHED: 2019-04-25
A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a nucleo.neatocloud.com:4443/vendors/neato/robots/[robot_serial]/messages Neato clou...
CVE-2019-9135
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution. .
CVE-2019-9136
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a malformed JPEG2000 format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.