Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:25 AM
Dark Reading
Dark Reading
Products and Releases

Research Firm Names Flashpoint a Strong Performer Citing Custom Collection Strategies, Cybercrime Analysis

NEW YORK, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Flashpoint, the global leader in Business Risk Intelligence (BRI), today announced its inclusion among the top emerging threat intelligence companies in “The Forrester New Wave™: External Threat Intelligence Services, Q3 2018” report.
For this report, Forrester Research evaluated the 15 most significant companies in the market and rated them against 10 criteria and where they stand in relation to each other. Flashpoint was rated a “Strong Performer,” with the report giving it a differentiated rating in dark web intelligence, threat feeds, cybercriminal and financial crime focus, as well as vision and execution criteria.
According to the report, Flashpoint “is the best fit for companies requiring finished intelligence reporting on business risk...it will develop custom collection strategies, even deploying custom infrastructure, to meet customer intelligence requirements.”1 The report also states that, in general, “vendor collection strategies are the biggest differentiator in the market.”
Finally, in assessing surface web and dark web intelligence, Forrester noted that the criteria were highly differentiated, writing: “Someone saying something on the dark web doesn’t make it true. Anyone with a TOR browser can access the dark web and visit markets to see all manner of items and services for sale. In these ‘open’ marketplaces, you have to assume a lot of the most sordid material is either grifting or law enforcement (read: low confidence). To obtain higher confidence intelligence, you need to access private forums.”
“Meaningful intelligence is about the right data at the right time with the right context and needs to come from high-quality sources,” said Josh Lefkowitz, CEO and co-founder, Flashpoint. “We believe Flashpoint’s rating as a ‘Strong Performer’ in this report is a testament to our team’s hard work and ability to deliver the best synthesis of raw data into finished intelligence, as well as a testament to our subject matter experts who deftly access elite and private online criminal communities and use their expertise and insights to inform collections and intelligence production.”
Access a free copy of The Forrester New Wave™: External Threat Intelligence Services, Q3 2018.
1 The Forrester New Wave™: External Threat Intelligence Services, Q3 2018, Forrester Research, Inc., September 7, 2018

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
AWS CISO Talks Risk Reduction, Development, Recruitment
Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-06-26
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-12887. Reason: This candidate is a reservation duplicate of CVE-2019-12887. Notes: All CVE users should reference CVE-2019-12887 instead of this candidate. All references and descriptions in this candidate have been removed to preve...
PUBLISHED: 2019-06-25
PC-Doctor Toolbox before 7.3 has an Uncontrolled Search Path Element.
PUBLISHED: 2019-06-25
Nessus versions 8.4.0 and earlier were found to contain a reflected XSS vulnerability due to improper validation of user-supplied input. An unauthenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a users browse...
PUBLISHED: 2019-06-25
Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.
PUBLISHED: 2019-06-25
HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6329.