Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/17/2016
08:00 AM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

20 Cybersecurity Startups To Watch In 2016

Some of the most intriguing security startups flush with funds, talent and ideas.
Previous
1 of 21
Next

 With an epic year in cybersecurity venture funding behind us and lots of money still flowing to startup coffers in 2016, expectations continue to grow for a blossoming crop of security startups. Yes, the hype may also be growing to epic proportions as everyone tries to outcompete with one another's game-changing, next generation, big data, intelligence-driven, platform-based silver bullet gizmos. But amidst all of the marketing puffery, there's substance to a lot of the innovation out there, as the latest class of newcomers tries to help practitioners fix what's broken in infosec today.

Here's a cheat sheet of some of the movers and shakers most likely to continue making waves in this year. These firms are primarily early- to middle-stage startups who've met some distinction in the past year. That might mean launching into a greenfield niche with a decent seed round, snagging a recent funding round in the last few months, or earning huge Series A or B rounds. Most of these firms have launched in the last three years. And many have earned distinction from their executive roster, with a number of well-known or otherwise highly credentialed security veterans at the helm. In the interest of bringing some new blood to the spotlight, we've included only companies that were not already featured in our 20 Startups To Watch In 2015, published last year. 

 

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1243979487872
100%
0%
ANON1243979487872,
User Rank: Apprentice
2/18/2016 | 5:11:28 PM
Problem with the way you display your articles' information
You guys have very interesting data posted.  However your format is atrocious, not up to date with displaying technology.  We have to click lots of times to get to see the info... I recommend you list the items on the first page and have pointers to more information about it... so we can see at a glance what the items are.  Many times I get discouraged from looking at our information due to the display format.
kshaurette
100%
0%
kshaurette,
User Rank: Strategist
2/18/2016 | 10:57:12 AM
Aristotle Insight - Why have you Overlooked them?
Maybe because they are not technically a startup, but I can't believe that Tenable is either and you've listed them in the list of company logos on your main article page.  Have you takent the time to look at and see a demonstration or ask any customers of a vendor called Sergeant Laboratories with a product called Aristotle Inisight to include a perspective on what they offer in your startups to watch.  I can't believe they didn't get some consideration, but it might be that they are not as cash flush to push marketing and sales dollars as some of the others. www.aristotleinsight.com
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
CVE-2020-21547
PUBLISHED: 2021-09-17
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
CVE-2020-21548
PUBLISHED: 2021-09-17
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
CVE-2021-39218
PUBLISHED: 2021-09-17
Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger ...