Vulnerabilities / Threats

10/3/2016
08:00 AM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

16 Innovative Cybersecurity Technologies Of 2016

This year's SINET 16 Innovators were chosen from 82 applicants representing nine countries.
Previous
1 of 17
Next

Image Source: Hywards/iStockphoto

Image Source: Hywards/iStockphoto

The Security Innovation Network (SINET) has shared the results of its annual SINET 16 competition created to discover the most innovative cybersecurity companies.

Each year, the organization's steering committee evaluates products from early-stage security companies from around the world and awards those it finds most compelling. The committee consists of 100 cybersecurity professionals who come from large businesses, government, VC firms, and academia.

Entrants must have a cybersecurity product, not only a service, in order to apply for SINET 16. Companies must also be completely autonomous and have annual revenues of $15M or less. They cannot have been previously selected as a SINET 16 Innovator more than once.

Companies named SINET 16 Innovators are invited to present their value proposition in front of 300 to 400 investors, buyers, researchers, and solutions providers. They are also given a booth to show their solutions at the SINET showcase in Washington DC, and receive free coaching to improve their messaging.

SINET lists five key criteria used to judge these emerging companies: 

  • Marketplace urgency for the product/solution
  • How innovative/unique the product is
  • How well the technology solves real, critical security problems
  • The advantages of the product over others
  • The company's ability to succeed based on the state of its product, leadership, and capital

This year's winners were chosen from a pool of 82 applicants representing nine countries and a variety of technologies built to address security threats and vulnerabilities.

Which companies made the final cut? Here, we take a closer look at the winners and technologies included in this year's SINET 16 Innovators lineup.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 17
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Alden86
50%
50%
Alden86,
User Rank: Apprentice
10/4/2016 | 4:41:24 AM
Facial Bed
GOOD POST
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.