This article showcases our top picks for the best New York based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top New York Cyber Security Companies
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. Founded in 2013 by security and risk experts Dr.
Alex Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant risk ratings that automatically map to vendor cybersecurity questionnaire responses – providing a true 360-degree view of risk.
SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve, and communicate cybersecurity risk to their boards, employees, and vendors.. .
Deep Instinct applies artificial intelligence’s deep learning to cybersecurity. Leveraging deep learning’s predictive capabilities, Deep Instinct’s on-device solution protects against zero-day threats and APT attacks with unmatched accuracy.
Deep Instinct safeguards the enterprise’s endpoints and/or any mobile devices against any threat, on any infrastructure, whether or not connected to the network or to the Internet. By applying deep learning technology to cybersecurity, enterprises can now gain unmatched protection against unknown and evasive cyber-attacks from any source.
Deep Instinct brings a completely new approach to cybersecurity enabling cyber-attacks to be identified and blocked in real-time before any harm can occur. Deep Instinct USA is headquartered in San Francisco, CA and Deep Instinct Israel is headquartered in Tel Aviv, Israel..
Flashpoint is the globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet. From bolstering cyber and physical security, to detecting fraud and insider threats, Flashpoint partners with customers across the private and public sectors to help them rapidly identify threats and mitigate their most critical security risks.
Learn more at https://www.flashpoint-intel.com/ or follow us on Twitter at @FlashpointIntel.. .
At White Ops, we are all about keeping it human. We protect enterprises all over the globe—including the largest internet platforms—from sophisticated bots by verifying the humanity of more than one trillion online interactions every week.
The most sophisticated bots look and act like humans when they visit websites, click on ads, fill out forms, take over accounts, and commit payment fraud. We stop them.
The White Ops Bot Mitigation Platform can detect, prevent and outwit bot populations of every level of sophistication. We get inside our adversaries’ OODA loops with proactive adaptation.
Our unique approach to bot mitigation put us in the lead role to collaborate with the FBI, Google, Facebook and many other partners in the takedown of 3ve, one of the largest botnets ever defeated.. .
Verint Systems is a provider of Actionable Intelligence solutions for enterprise workforce optimization and security intelligence. Their solutions help government and enterprises make sense of the vast information they collect in order to achieve their performance and security goals.
Today their solutions are used by more than 10,000 organizations in 150 countries. Verint is headquartered in Melville, New York, with offices worldwide and 2500 dedicated professionals around the globe..
Axonius is a cybersecurity asset management platform that helps secure and manages connected devices in use by businesses. The platform that lets IT and security teams see devices for what they are in order to manage and secure all.
It delivers a unified, extensible, and open system that integrates information from networked devices and existing device-specific standalone management service, creating a single visibility and control environment, enabling Information technology and security operations teams to safely engage device adoption and usage at scale. Avidor Bartov, Dean Sysman, and Ofri Shur co-founded the company in New York in 2017..
Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT) environments. Organizations with highly automated production sites and factories that face significant security and financial risk especially need to bridge this gap.
Armed with Claroty’s converged IT/OT solutions, these enterprises and critical infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety, and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is more uptime and greater efficiency across business and production operations.
Backed and adopted by leading industrial automation vendors, Claroty is deployed on all seven continents globally. The company is headquartered in New York City and has received $100 million in funding since being launched by the famed Team8 foundry in 2015.
For more information, visit www.claroty.com.. .
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom.
Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis is headquartered in New York City and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
Semperis hosts the award-winning Hybrid Identity Protection conference (https://www.hipconf.com). The company has received the highest level of industry accolades; most recently being named “Best Business Continuity / Disaster Recovery Solution” by SC Magazine’s 2020 Trust Awards.
Semperis is accredited by Microsoft and recognized by Gartner.. .
HYPR is The Passwordless Company backed by Comcast, Samsung, and Mastercard. The HYPR Cloud Platform makes it easy to go Passwordless across the enterprise by combining the security of a smart card with the convenience of a smartphone.
With HYPR, businesses are finally able to solve the desktop MFA gap, eliminate customer passwords, and deliver lightning-fast login experiences their users love.. .
BigID develops software that helps companies have secure customer data and satisfy privacy regulations. It uses advanced machine learning and identity intelligence to help enterprises better protect their customer and employee data at a petabyte-scale.
The company helps organizations manage and protect their customer data, meet data privacy and protection regulations like the CCPA and GDPR, and leverage unmatched coverage for all data across all data stores. BigID aims to give enterprises the software to safeguard and steward the customer data, by bringing data science to data privacy.
BigID has offices in the US and Israel and is founded in 2016 by security industry veterans spanning the identity, data security, big data, and governance markets.. .
BlueVoyant is a cybersecurity company that enables cybersecurity defense and protection through technology and tailored services. The company provides advanced cyber threat intelligence managed security services and proactive professional services with forensic capabilities for incident response and remediation.
They help large enterprises with impactful intelligence and offer small and medium enterprises the same kind of software and level of services that large enterprises enjoy all from a world-class team of experts that would be challenging to amass directly. BlueVoyant offers increased visibility, professional insights, and targeted responsiveness.
The company was founded in 2017 and is headquartered in New York, NY, USA.. .
IntSights is an external threat intelligence and protection platform, designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect and prevent threats at their source before they even reach the perimeter.
The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others..
Payfone is a mobile and digital identity authentication solutions provider for businesses. It provides identity certainty, the ability to validate customers to create easy, secure, and frictionless experiences across PC’s, mobile phones, and tablets, and allows enterprises to deliver fast, frictionless, and fraud-free customer experiences to over 90% of customers.
Payfone was founded in 2008 and is headquartered in New York, United States.. .
ThetaRay is a provider of unknown threat detection solutions to critical infrastructure, financial institutions, and other verticals. Its advanced analytical solutions operate with unprecedented speed, accuracy and scale, enabling clients to manage risk, detect money laundering schemes, uncover fraud, expose bad loans, uncover operational issues and reveal valuable new growth opportunities.
Founded in 2013, the company is headquartered in Hod Hasharon, HaMerkaz, Israel.. .
Siemplify is a security orchestration, automation, and response (SOAR) provider that is redefining security operations for enterprises and MSSPs worldwide. Its holistic security operations platform is a simple, centralized workbench that enables security teams to better investigate, analyze, and remediate threats.
Using automated, repeatable processes and enhanced measurement of KPIs, Siemplify empowers SOC teams to create a culture of continuous improvement. Siemplify’s patented context-driven approach reduces caseload and complexity for security analysts, resulting in greater efficiency and faster response times.
Founded by Israeli Defense Forces security operations experts with extensive experience running and training numerous SOCs worldwide, Siemplify is headquartered in New York with offices in Tel Aviv.. .
EverC provides cyber intelligence that enables acquiring banks and payment service providers to manage merchant-based fraud and cyber risk. The startup company uses artificial intelligence to look into its client’s portfolios and identify links with potential criminals using its cyber intelligence capabilities.
It is engaged in providing a range of solutions that give acquirers and payment service providers with the necessary relevant information to check ongoing and newly boarded merchants while guiding them through the process of managing online risk, detecting transaction launderers, hidden transaction tunnels, and fraud detection. EverC’s products include MerchantView for detecting online money laundering and MarketView for keeping marketplaces clean from illegal products.
Founded in 2008 by Ron Teicher, Noam Rabinovich, and Raz Abramov, the firm is headquartered in New York, New York.. .
AppViewX is revolutionizing the manner in which NetOps and SecOps teams deliver services to the rest of Enterprise IT. The AppViewX Platform is a modular, low-code software application that enables the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow.
Leveraging a vast library of pre-built tasks and workflows, the platform enables Ops teams to quickly and easily translate business requirements into automation workflows that improve agility, enforce compliance, eliminate errors, and reduce cost. AppViewX customers include a significant number of Fortune 500 companies which use the AppViewX Platform at scale.
AppViewX is headquartered in New York with additional offices in the U.S., U.K., and India.. .
Cyware offers the technology organizations need to build a virtual cyber fusion center. With separate but integrated solutions including an advanced threat intel platform (TIP), vendor-agnostic security automation (SOAR), and security case management, organizations are able to increase speed and accuracy while reducing costs and analyst burn out.
Cyware’s virtual cyber fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for enterprises, sharing communities (ISAC/ISAO), MSSPs, and government agencies of all sizes and needs.. .
CyberMDX is an IOT security leader dedicated to protecting the quality care of health delivery worldwide. CyberMDX provides cloud-based cybersecurity solutions that support the advancement of The Internet of Medical Things.
The CyberMDX solution identifies endpoints and assesses vulnerabilities to detect, respond to, and prevent cyber incidents. Deployed worldwide, CyberMDX is designed to integrate with our customers’ existing environments through its scalable, easy-to-deploy and agentless solution..
CertiK leads blockchain security by pioneering the use of cutting-edge Formal Verification technology on smart contracts and blockchains. Unlike traditional security audits, Formal Verification mathematically proves program correctness and hacker-resistance.
CertiK was founded by Computer Science professors of Yale University and Columbia University, securing over $6B in assets, including many of the world’s top projects.. .
SKOUT Cybersecurity provides a cybersecurity platform consisting of 24/7 security monitoring, endpoint protection and email protection through the channel. SKOUT’s security team deploys the industry’s most cutting-edge tools at affordable prices, providing the technology and protection to make cybersecurity accessible for all.
SKOUT’s Cybersecurity Platform is led by a team of experts from both the government and private sector. SKOUT’s platforms are built to scale and our partners and their clients can benefit from achievements such as our SOC 2 certification and CJIS Accreditation.
Typically these types of investments are only available to the Fortune 500; SKOUT makes them accessible to everyone.. .
RevBits’ Cyber Intelligence Platform (C.I.P.), a full product suite, fundamentally transforms the cyber-security market. Single source, “best in class”, with patented methodologies eliminates multiple vendors and related integration and training issues.
Cutting-edge modules include RevBits Privileged Access Management, RevBits EndPoint Security, RevBits Email Security, RevBits Deception Technology and RevBits Security Awareness Training. .
Beyond Identity’s mission is to empower the next generation of secure digital business by replacing passwords with fundamentally secure X.509-based certificates. This patent-pending approach creates an extended Chain of Trust that includes user and device identity and a real-time snapshot of the device’s security posture for adaptive risk-based authentication and authorization.
Beyond Identity’s cloud-native solution enables customers to increase business velocity, implement new business models, reduce operating costs, and achieve complete passwordless identity management.. .
AppGuard is a revolutionary new approach to prevent breaches from threats that traditional anti-virus software is not equipped to face, including fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats. It automatically and dynamically stops an attack at its initial stages and beyond without requiring detection of the attack, disrupting the user experience, or degrading system performance.
It generates valuable Indicators of Attack (IOA) alerts without a compromise occurring. AppGuard is compatible with all Windows versions from XP to 10, standard and custom applications, and typical system maintenance tools, and supports Windows Server 2008 R2 and above..
Inpher.io is a secret computing technology for privacy-preserving machine learning and AI. Inpher is a veteran team of entrepreneurs, cryptographers, and computer scientists who believe that privacy and security are foundational to the future of computing.
It has developed transformational Secret Computing™ technology to run analytics and machine learning algorithms on private data sources with zero-knowledge. This provides a secure path to cloud services and the monetization of analysis and insight without revealing sensitive data..
GrammaTech’s software-development tools are used worldwide by startups, Fortune 500 companies, educational institutions, and government agencies. Our staff includes eleven PhD-level experts in static analysis.
The company was founded by Professor Tim Teitelbaum of Cornell University and Professor Tom Reps of the University of Wisconsin.. .
Cybint is a global cyber education company with a commitment to reskilling the workforce and upskilling the industry in cybersecurity. It tackles the industry’s two greatest threats: the talent shortage and the skills gap.
Their approach to combatting cybercrime fuses timely threat-based content, role-specific learning paths, and accelerated training methods to maximize retention and minimize risk. The company was founded in 2014 and now has offices in New York City, Tel Aviv, and Singapore; and partners in more than 15 countries..
Firedome secures and supports IoT connected devices and prevent next cyber-catastrophe. Firedome offers products and services that support different needs from active cyber-protection to analytics, insights, and cyber-security fleet management.
The company was founded by security veterans with offices in New York and Tel Aviv.. .
Axio helps organizations understand cyber exposure, calculate risk, and make data-driven decisions that improve their security and risk posture and accelerate the maturity of an organization’s capability to manage cyber risk. A business can quantify cyber risk and measure your cyber resiliency by determining the effectiveness and cost and of your cyber risk capabilities, assessing if they are reasonable and optimal for an organization, and determining what other controls (not just technologies) need to be put in place.
Axio provides all stakeholders with a common framework to proactively manage cyber risk, in terms that the entire organization can understand. CISOs can now explain what they do, how they do it, and what it means with regards to overall cyber risk for the business.
Risk officers can optimize their insurance portfolio and invest in the specific types of cyber insurance and limits that protect their business. Board members and executive leadership can now be confident in their cyber strategy and their ability to achieve and sustain resiliency.
Axio delivers cyber resilience optimization.. .
SECDO transforms the way global enterprises handle incident response, allowing security teams to investigate and remediate complex threats in minutes. The SECDO Next Generation IR platform automates endpoint forensic analysis and cyber investigations to lower the skills barrier and make security teams more effective.
With SECDO, enterprises and MSSPs can instantly get the full story behind every alert and respond immediately with the most powerful set of remediation tools available.. .
Fraud.net is the leading fraud prevention platform for digital enterprises in the e-commerce, travel and financial services sectors. Its unified algorithmic architecture combines: ● AI & deep learning, ● Collective intelligence, ● Rules-based decision engines, and ● Streaming analytics to detect fraud in real-time, at scale.
Fraud.net is the only cloud-based “glass-box” system, offering a full and transparent presentation of the data, statistics and contextual variables to help organizations simultaneously reduce risk and optimize business processes. Enterprises can simplify their fraud management, defending against different types of fraud through one unified solution.
The solution covers many use cases, including: ● Account Takeover ● Application Fraud ● Call Center Fraud ● Chargeback Protection ● Collusion ● Gift Cards & Rewards ● “Friendly” Fraud ● Insider Threats ● KYC & AML ● Loan & Credit Fraud ● Mobile Fraud ● Omnichannel Fraud ● Payment Fraud ● Return Fraud ● Synthetic Identity and much more. Please call or visit us at fraud.net to arrange for a free consultation..
Votiro specializes in eliminating file-borne attacks carried through email, web downloads, portal uploads and all file sharing platforms. In real-time, our Positive Selection technology removes the need to block files entering your organization.
Votiro neutralizes all weaponized files containing zero-day and undisclosed attacks ensuring the enterprise that any and all files are completely safe to open.. .
Centraleyes™, an integrated risk management platform which gathers information from disparate sources, integrates internal and external data and present the organization’s risk and compliance via a single pane of glass. The platform consolidates and automates traditional risk management, providing comprehensiveness only dreamed of until now, enabling leaders to responsibly zero in on trouble spots, understand what to do and take action.
With Centraleyes, risk and security managers are freed from tedious, repetitive labor to focus on strategic priorities and business success.. .
BrandShield® is an innovative Online Brand Protection solution. It’s robust, patented technology finds trademark infringements, counterfeit sales and online phishing and fraud.
The system analyzes content and metrics of each website, marketplace or social platform, and uses sophisticated algorithms to automatically prioritize the level of risk to the brand. BrandShield’s ground breaking pattern recognition technology finds major brand threats.
It also includes enforcement tools and service, to form a powerfull Threat Intelligence solution. BrandShield’s robust, patent pending technology helps fighting infringements and makes brand protection possible for all sizes of organizations.
BrandShield’s A-Z solution protects the brand from detection of threats to their takedown. Brandshield’s proactive aproach extends any organization’s assets protection outside the organization’s perimeter.
BrandShield detects logo usage online, fraud clusters, cross-platform connections and prioritizes online threats customized uniqely for each brand. BrandShied’s technology dramatically improves the way organizations can manage and protect their digital brand.
Till now online brand protection solutions were limited, based on human analysis, highly expensive, and therefore available only to the biggest companies. BrandShield’s technology revolutionizes this market, and will allow every business to monitor and protect its brand online, at a reasonable cost.
Bayshore Networks, Inc.
Bayshore Networks, named a Gartner Cool Vendor and SINET 16 Innovator for 2015, is the cybersecurity leader for the industrial Internet of Things. The Company’s award-winning, patented Bayshore IT/OT Gateway™ software deploys in the cloud, enabling Fortune 1000 industrial enterprises with unprecedented visibility into their OT networks.
It safely and securely protects industrial applications, networks, machines and workers. The Bayshore Gateway software is distinguished by granular inspection and filtering of network flows, policy building and enforcement, and its ability to detect, parse and segment industrial protocols.
Leveraging these capabilities, Bayshore delivers ROI in areas such as M2M cybersecurity, operational continuity, data loss protection and plant safety.. .
Todyl’s Secure Global Network was built with security baked in, not bolted on, helping channel partners address some of the toughest challenges facing businesses today. Todyl consolidates multiple security products, features integrated SIEM and GRC, reduce the attack surface area and leverages our patent-pending ZeroTrust technology to stop threats like ransomware and Fileless Malware from spreading.
With Todyl, partners can deliver world-class, cost-effective security programs to businesses of any size.. .
NuID is a pioneer in trustless authentication and decentralized digital identity. The NuID platform leverages zero knowledge cryptography and blockchain technology to eliminate the need for businesses to store passwords and other authentication credentials.
NuID’s unified protocol for strong authentication supports passwords, tokens, and biometrics—enabling businesses to reduce security risks and streamline user experience. Our mission is to end wide-scale credential breaches by returning data ownership to the individual..
Shape Matrix is committed to helping organizations harness the power of truth as a competitive advantage to build trusted and fast-growing enterprises. The Shape Matrix system uses geometric shapes to generate an inexhaustible number of visually appealing 2D and 3D marks – Shapetags – that serve as secure, serialized, hard-to-clone identifiers for physical and digital objects.
Shapetags are easily recognized by the human eye, quickly authenticated with off-the-shelf mobile devices and impossible to decode without authorized access. Shapetags can be applied to tiny items as well as those made of difficult-to-track materials like wood and liquids.
Shape Matrix technology provides organizations with the traceability solution needed to secure its assets, supply chain and data. The Shape Matrix system was created by Shape Operating System Industries, Inc., a Brooklyn-based innovation lab backed by IA Ventures, Lerer Hippeau Ventures, Greycroft, Slow Ventures, Bloomberg Beta, Box Group, GGV Capital, Traverse Capital and others.
For more information, visit http://www.shapematrix.com.. .
Advanced Cyber Security
Advanced Cyber Security offers next-generation cybersecurity for the enterprise, small business, and consumer. Advanced Cyber Security is a pioneer in endpoint security, with proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement.
Advanced Cyber Security’s products provide the first line of defense to a company’s layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Security’s Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments..
Cyber Security Hub
The Cyber Security Hub is an online news source for global cyber security professionals and business leaders who leverage technology and services to secure the entire perimeter in their enterprise. They’re dedicated to providing the latest industry news, thought leadership, and analysis in the cyber security space.
Cyber Security Hub’s expert commentary, tools, and resources are developed through obtaining data and interviewing end-users and analysts throughout the industry to deliver practical and strategic advice. Their editorial team surveys and monitors the latest trends in cyber security and creates news articles, market reports, case studies, and in-depth analysis for a captive audience consisting of c-level, VPs, and directors of cyber security and information technology..
Curv is a developer of digital asset security infrastructure helping crypto-native and financial institutions to create digital wallets. The company’s security technology is enabling users to build crypto finance products that safely transfer, store, and manage any digital asset on any blockchain or digital system for recording transactions.
Its research and development office is located in Tel Aviv, Israel. Curv’s decentralized security model utilizes multi-party computation (MPC) protocols, enabling transactions to be securely signed in a mathematically-proven, distributed way.
Its enterprise-grade policy engine allows clients to define risk profiles and enforce granular policies to ensure only authorized transactions are allowed. Dan Yadlin and Itay Malinger established the company in New York, New York in 2018..
Criptext is the world’s first and only email service to never collect and store your data. All your emails are exclusively stored in your device for maximum privacy and control.
Beyond privacy, Criptext in the only email service to boast the coveted Signal encryption, making it quite possibly the most secure email service – ever. No gimmicks, just easy to use email that’s built around your privacy and security.
Features: +End-to-end Encryption: Criptext uses the open source Signal Protocol library to encrypt your emails. Your emails are locked with a unique key that‘s generated and stored on your device alone, which means only you and your intended recipient can read the emails you send.
+No data collection: unlike every other email service out there, Criptext doesn’t store your emails in its servers. Instead, your entire inbox is stored exclusively on your device.
+Open Source: our source code is open for everyone to see that Criptext actually works the way it’s advertised. You don’t have to trust us, you can verify for yourself: https://github.com/Criptext +Easy to use: our app is designed to work as simple as any other email app — so much so, you’ll forget how secure it is..
Uplevel Security is the industry’s first adaptive system of intelligence that uses graph theory and machine learning to modernize security operations. Uplevel Security ingests and contextualizes incoming and historical security data, allowing the past to inform the present and the present to inform the past, which predicts how attacks may manifest in the future.
Enterprises rely on Uplevel Security to activate intelligence from the security stack, provide a system of record for security data and become stronger with every attack.. .
One World Identity (‘OWI’)
OWI is an independent identity research and strategy company focused on digital commerce and infrastructure. We help businesses, investors, and governments stay ahead of market trends so they can build sustainable, forward-looking identity-enabled products and strategies.
OWI accomplishes this by building community and facilitating dialogue through the KNOW Identity Conferences, as well as services the community with our educational content, news, media, and client services.. .
Better Mobile Security
Better Mobile Security is a Mobile Threat Defense (MTD) solution provider that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or privacy. Better MTD’s predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels.
It also works seamlessly with leading Enterprise Mobility Management (EMM) solutions to protect corporate resources and can be easily deployed to vast mobile networks with just a few clicks. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on.
The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks..
Polymer is a data governance and privacy platform for third-party SaaS applications such as Slack, Dropbox, Gdrive, Zendesk, Zapier, and many others. This protects against data loss and cyber breaches.
The solution provides a single pane of glass to configure, permission, and track usage of sensitive data across the organization to become PII, PHI,HIPAA, GDPR, CCPA compliant.. .
SaferVPN is a leading, premium VPN service providing complete Internet freedom, security and privacy to hundreds of thousands of people worldwide. With our state-of-the-art technology, effortless interface and dedicated 24/7 customer support, anyone can easily access their favorite geo-restricted content and browse the web swiftly, safely and anonymously.
Unlike other VPN providers, we automatically protect our customers from the dangers of unsecured public Wi-Fi and manage our extensive, global VPN server network in-house to deliver unparalleled speed, stability and security. SaferVPN is not only committed to providing an exemplary product and service but also advocating for freedom of expression and speech.
As Internet freedom fighters we’ve partnered with Movements, Advancing Human Rights’ crowdsourcing platform, to establish #UnblockTheWeb, a powerful initiative to provide unrestricted Internet access to activists living in closed societies around the world. Discover the benefits of our service at https://www.safervpn.com Blog: https://www.safervpn.com/blog Free trial: https://www.safervpn.com/vpn-free-trial.
Pixm is a computer and network company that specializes in cybersecurity and endpoint security. Its services also offer anti-phishing, email security, computer vision, and deep learning it helps companies, businesses, and organizations on website, network, and computer security.
The company was founded in 2015 and headquartered in New York, United States.. .
SAFE Button replaces ‘Sign-In with Facebook’ and ‘Sign in with Google.’ It is a free service provided by websites concerned for your privacy, which does not track you and never sells your data. Also, the SAFE Button does not use passwords.
We send a cryptographic message to your smartphpone, and all you have to do is approve with one tap to login to your favorite sites, or register for new online accounts. You can use the extra security in your phone like FaceID to Samsung Fingerprint reader with no codes to enter! And with the SAFE Button, you never get unwanted spam emails or notifications on your phone..
Assured Information Security
Assured Information Security is a software company focused on the research of critical Air Force and DoD cyber technology requirements. The company’s innovative applications and analysis enhance military, intelligence, and homeland security activities securing their nation’s networks and weapons systems.
Assured Information Security provides government and commercial customers with industry-leading cyber and information security capabilities specializing in research, development, consulting, testing, forensics, remediation, and training. Their research products and services are focused on performing system-level vulnerability assessments, reverse engineering, data analysis, trusted systems design, and cyber-operational systems integration for both hardware and software systems.
AIS personnel staffed and operated the Adversarial Sciences Laboratory within the Air Force Research Laboratory, Information Directorate, Rome, NY, pursuing all aspects of cyber operations. The company was founded in 2001 and is headquartered in Rome, New York, United States..
MediaTrust makes online direct response advertising effective & efficient for advertisers, agencies, affiliate marketers and publishers by connecting quality clicks to conversions with the innovative PerformanceExchange real-time cpc bid exchange for performance marketing. MediaTrust’s PerformanceExchange connects advertisers with customers in real-time via our proprietary CPC bidding and customer delivery system.
Advertisers * Expand your reach… beyond search to high quality email & content * Target your audience…
where, when & how you want * Connect clicks to performance… winning bids deliver quality consumers * Analyze & optimize…
campaigns & bids for optimal conversion ROI Publishers * Monetize your traffic… xml, text link, search, display to email & content channels * Deliver relevant ads…
variety of targeted & unique campaigns * High consistent CPC payouts… have confidence that your quality clicks always hold value & maximize inventory yield * Tools & Analytics…
optimize your traffic quality ROI The company was recently named the 9th fastest growing US company in 2009 & 2010 by Inc. 500 & #1 Performance Marketing Network by Revenue Performance Magazine.
Neokami is a breakthrough Artificial Intelligence software company. Leveraging next generation machine learning algorithms, Neokami’s core platform has been optimized to solve a focused set of today’s pressing data security problems.
The product enables companies to discover, classify and help secure sensitive data in the cloud, on premise, or across their physical assets.. .
Cyber Innovative Technologies
Cyber Innovative Technologies is the leader in digital asset cyber risk quantification and scoring for organizations and vendors. Our products allow customers to measure and mitigate cyber risk using a graphical user interface to model risk and a set of dashboards, reports and workflows incorporated into a role based management platform for boards, C-level management, CISOs, DPOs, auditors, compliance managers, vendors, and regulators.
Use cases include cyber insurance limits, vendor risk management, organizational risk management, GDPR, compliance management, Cybersecurity tool ROI, M&A cyber due diligence. Mentioned in August of 2020 by Gartner in the Hype Cycle for Cyber Risk Management; https://www.gartner.com/document/3987308?ref=solrAll&refval=259016665.
IDSS Holdings, Inc. provides defense and security solutions.
It offers government services, such as support services, technical solutions, and cyber security capabilities to the classified defense intelligence community; applied technologies, focused on developing next generation checkpoint systems for airports and buildings; and data management, including biometric, advanced credentialing, identity management, and system integration solutions for government and private sector applications. The company offers its products and services for the United States and international security agency requirements.
IDSS Holdings, Inc. was incorporated in 2012 and is based in Armonk, New York..
IperLane offers businesses and organizations with mobile monitoring and access controlling solutions. It provides its services through an API.
IperLane offers solutions that enable businesses to collect data about network connections and file-related actions from their employees’ work applications. IperLane was founded by Kelly Shortridge and Vincenzo Iozzo in March 2015.
It is based in New York.. .
TypingDNA provides typing biometrics authentication as a service, enabling companies to recognize people by the way they type. The company’s authentication technology compares how people type on their keyboards against previous recordings.
Works on both mobiles and PCs. Headquartered in New York, United States, with offices in Romania, EU..
A new approach to the fight against sophisticated cyber attacks. Sophisticated attackers are no longer constrained by the concept of an enterprise network perimeter.
These attackers are focused on gaining an initial foothold inside of an organization, then pivoting through the internal network until they achieve their intended goal. Effectively combating these types of attacks requires network segmentation and visibility solutions that were unavailable until now.
PathProtect, by Drawbridge Networks, gives your security team unprecedented visibility into your network and real-time control over lateral network movement. With PathProtect, you can segment sensitive systems and quarantine infected hosts at the touch of a button.
Own Your Network.. .
Trail of Bits
Our clientele - ranging from Facebook to DARPA – lead their industries. Their dedicated security teams come to us for our foundational tools and deep expertise in reverse engineering, cryptography, virtualization, malware, and software exploits.
According to their needs, we may audit their products or networks, consult on the modifications necessary for a secure deployment, or develop the features that close their security gaps. We’re especially well suited for the technology, finance, and defense industries.
After solving the problem at hand, we continue to refine our work in service to the deeper issues. The knowledge we gain from each engagement and research project further hones our tools and processes, and extends our software engineers’ abilities.
We believe the most meaningful security gains hide at the intersection of human intellect and computational power.. .
GamaSec is a cyber-security company that lowers the risk and strengthens the resilience of businesses from attacks on their websites and web applications. GamaSec provides a portfolio of services including web vulnerability scanning, daily malware detection, blacklist monitoring, and remediation as a service.
This combination of a proprietary security platform and industry knowhow enables GamaSec to deliver industry solutions for website security, and rapidly respond to market needs. .
BreachLock is a security startup that offers a unique SaaS platform delivering on-demand, continuous and scalable security testing suitable for modern cloud and DevOps powered businesses. The BreachLock platform leverages both human powered penetration testing and AI-powered automated scans to create a powerful and easy to use solution that delivers continuous and on-demand vulnerability management.
BreachLocks’s modern SaaS-based approach redefines the old school and time-consuming pen test model into fast and comprehensive security as service. As a result, CIO’s and CISO’s get a single pane view into their application and network security posture.
The BreachLock platform facilitates collaboration between your DevOps and BreachLock security researchers empowering them to fix security gaps at the speed of business.. .
Reservoir Labs’ mission is to make Their world safer, cleaner, more secure and more efficient through the application of radical high performance computing technologies. They create highly useful advanced computing and communications products, develop novel technologies, and conduct thought-leading research that is trusted and respected by commercial customers, government customers and other leading researchers.
Their high performance computing experts are committed to leveraging applied research to build important new products for security and science.. .
We design, deploy, and maintain advanced technologies that enable our customers to achieve operational excellence at substantial OpEx savings. Our core strengths include a concentration on networks, their security & optimization with a laser focus on redefining the fulfillment experience.
We are driven to add value at every step by providing access to inventory, streamlined credit, integration with your procurement organization and real time status information. These are all reflective of our value-added philosophy.
We have developed solutions for leaders from Wall Street to the Web. What makes us different is our concentration and commitment to exclusive relationships with leading vendors..
Blackchain is a management consulting company focusing on the blockchain industry. In particular, Blackchain assists the teams in Business Model including Token Model and Token Economics, if needed, Strategy and Valuation, Growth Hacking, Black Marketing (ethical hacking techniques applied to marketing).
It provides valuable and ‘expensive’ data that helps their clients understand the fastest roadmap to customer acquisition.. .
miniOrange is a cloud based platform which provides Single Sign-On (SSO), Two Factor Authentication (2FA), Fraud Prevention and Cloud/Network Security. miniOrange is founded by security architects and technology leaders who have extensive experience in solving complex security problems of the industry via technology using global delivery models.
Their Differentiation lies in applying technical expertise and experience to unique Industry needs and challenges. The team at miniOrange brings extensive experience and expertise in Security Consulting and Product development.
They take pride in partnering with their customers and bring forth their security domain expertise in Cloud Security, Identity and Access Management, Mobile Security, Vulnerability Management and have specific products and solutions in these areas. Their team includes security architects and information security professionals who have extensive experience in design, architecture and delivery of complex enterprise security products.
They have built high performing teams in US and India and scaled them to support mid and large sized enterprises. Their team has multiple papers published on various security and engineering topics related to Strong Authentication, Access Governance, Vulnerability management, Mobile Security – Access Gateway, Cloud Security – IAM of a cloud stack, Agile adoption in distributed teams, Team collaboration etc.
They are also a strong agile proponent and have successfully transformed teams doing waterfall into adopting agile/scrum methodologies. They have been responsible for leading a range of product releases, from a v1.0 to a flagship product generating millions of dollars in revenue..
Money20/20 is the largest global event enabling payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. Drawing 11,500+ attendees, including more than 2,100 CEOs & Presidents, from over 3,500 companies and 100 countries, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money.
Money20/20 USA will be held in Las Vegas, October 21-24, 2018.. .
JustProtect is a Software-as-a-Service platform that helps enterprises simplify the process of distributing and responding to internal and third-party assessments to meet regulatory assessment requirements. The company offers automated risk assessment solutions to businesses of all sizes, plugging seamlessly into an organization’s data to ensure compliance at any stage of the business life cycle.
It aims to eliminate spreadsheet-based assessments and accelerate the process and reporting of data gathered, to provide organizations with data that more accurately assesses the maturity of an organization at multiple levels to make meaningful business decisions. Its SaaS platform uses industrial psychological assessment techniques and will gather behavioral analytics while asking compliance questions to people at different levels, to be able to determine the real efficacy of compliance control.
JustProtect was founded in 2017 and is headquartered in New York, New York.. .
MSA Security is an industry leader in high consequence threat protection and specialized training for corporate and government clients. The MSA Security team is comprised of security professionals with diverse backgrounds in law enforcement, elite military units, and the private sector working together to provide unparalleled explosives detection, consulting, training, and perimeter security services.
MSA Security combines hands-on expertise with information and technology to minimize our clients’ vulnerabilities to foreseeable threats.. .
Reliant’s Redbox Platform transforms the delivery and support of retail systems through an appliance-based converged infrastructure solution, which enables a wide range of application, systems and network configurations. The Redbox Platform solution replaces Retail’s traditional, inflexible approach to store systems with an agile model that can be centrally managed across a countless number of stores and eliminates the need for additional dedicated equipment to run each in-store application.
The result: retail executives can keep pace with 21st century customer engaging applications while keeping costs in control by using this highly flexible and secure architecture. In addition to our patented Redbox Platform, which is designed for merchants with multi-site retail locations, we offer consulting services and a managed services program.
Our management team is QIR, CISSP and CISM-certified and consists of leaders in the fields of networking, PCI compliance, POS and payment technology. Our clients include many of the world’s foremost global retail brands in the specialty retail, luxury, restaurant and convenience store industries.
Reliant addresses security, networking and in-store computing on a holistic basis to allow you to reduce the cost and risk of delivering customer-engaging technologies in your stores. Redbox Platform’s innovative design allows you, for the first time, to consolidate a wide range of different network, security, infrastructure and application functions in a single low-cost appliance.
Our active participation on the PCI Security Standards Council is paramount to our commitment to PCI. This focus is what allows us to maintain our solutions at the forefront of the PCI Regulations; as a result, we keep you ahead of the continuing changes and demands of PCI compliance..
The Hacker News
The Hacker News (THN) is the most trusted, widely-read, independent source of the latest news and technical coverage on cybersecurity, hacking threads, and infosec trends. Attracting over 10 million monthly readers worldwide, The Hacker News is one-stop for IT professionals, researchers, hackers, technologists, and enthusiasts.
The Hacker News features the latest cybersecurity news and in-depth coverage of current as well as future trends in Infosec and how they are shaping the cyber world. We started THN as a dedicated cybersecurity and hacking news platform in 2010 to educate people on how to use the Internet in the safest way.
In the following years, the website has turned into one of the most significant information security platform and working as a bridge between a large number of communities including leading security researchers, geeks, techies, business grads, CISOs, along with thousands of security professionals. The team of cybersecurity journalist and experts at The Hacker News is continuously working in the direction to better the platform and would love to hear your valuable thoughts and feedback to make it more resourceful.
Got a news tip or more information about a topic we covered? Awesome! Reach out to us and get featured—send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Email — [email protected] .
Dark Reading is an IT-focused comprehensive news and information portal that helps information security professionals manage the balance between data protection and user access. The portal provides its users with up-to-date information about products, management strategies, architectures, and security policies.
Dark Reading encompasses ten communities which drill deeper into the enterprise security challenge: attacks and breaches, application security, cloud security, data leaks and insider threats, endpoint security and privacy, network and perimeter security, risk management and compliance, security management and analytics, vulnerabilities and threats, and mobile security. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts, and other Dark Reading members to provide timely, accurate, and informative articles that lead to spirited discussions.
Dark Reading was launched in 2006.. .
UnderDefense is a boutique cybersecurity company specialized in Threat Hunting, Incident Response and Cloud based Security Operations (SecOps). UnderDefense offer 24/7 security monitoring with Incident Detection and response, CISO, compliance audits.
Global distributed team with 24×7 coverage to respond on incidents and data breach situation More than 100 global customers 24×7 Security Operations Center Real experts that makes security investments work hard. .
Arete Advisors is a cybersecurity company providing an accelerated incident response for detecting and responding to cyber-attacks. The company advisor services provide legally defensible, compliant cyber strategies that assist the C-Suite and Boards of Directors to continuously improve the organizations’ cyber posture.
Arete Advisors support multiple missions in the areas of Education, Healthcare, Critical Human Needs, and the Environment. Their mission is to protect and defend organizations against the financial and reputational damages caused by data breaches.
The company core skills include triage, digital forensics, malware reverse engineering, remediation, managed detection response, hunt, and testifying expertise.. .
Guidepost is a global investigations and security company with expertise in designing and managing the installation of physical security and life safety systems for both new and existing sophisticated facilities and operations. The company also provides monitoring and compliance, and expert investigative and security consulting services and advice to companies, government agencies, individuals, and their counsel, to solve problems, advance business opportunities, mitigate risks, and resolve disputes.
Headquartered in New York, with offices in Washington DC, Chicago, Dallas, Oakland, Palm Beach, and San Diego, Guidepost has resources and assets throughout the world, including a management team made up of investigators who are former prosecutors and law enforcement and intelligence officers, forensic accountants, and computer forensics specialists, among others.. .
NextNine is a leader in Operational Technology (OT) security management software for industrial and critical infrastructure, markets that are vulnerable to cyber security attacks and are underserved by conventional enterprise IT solutions. Using NextNine you can have centralized OT security management for your entire SCADA/ICS environment.
Distributed critical infrastructure plants and facilities with proprietary ICS/SCADA networks and devices, paired with the need for external vendors to provide remote maintenance and support, create an ideal target profile for hackers and terrorist attacks. Traditional IT security management solutions were designed to manage standard computing environments and cannot handle the proprietary processes, networks and devices of the ICS/SCADA world.
In contrast, NextNine has over 10 years of leadership in OT security, and has purpose-built its product to deal with these unique challenges. NextNine’s solution is an industrial strength software platform delivering robust, customizable and field proven OT security management.
Top tier critical infrastructure companies along with 5 of the 7 largest industrial vendors have standardized on NextNine. Today, the company has 6000 installations globally in fields such as oil, gas, mining, chemicals, energy, manufacturing, defense and critical infrastructure.
NextNine has been recognized by the White House for its leadership in the efforts to improve critical infrastructure cyber security. NextNine has received ISO/IEC 27001:2013 certification, assuring NextNine’s employees operate a comprehensive security program and manage information security risks effectively.
NextNine’s certificate is issued by the Standards Institution of Israel. The company was founded in 1998, is privately held and headquartered in New York..
GreyCastle Security is a leading service provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks. Our company was established to counter rapidly evolving cyber threats and to deliver cybersecurity solutions effectively, practically and continuously.
GreyCastle Security provides Risk Assessment, Awareness, Vulnerability Assessment, Penetration Testing, ISO and Incident Response services to businesses throughout North America. Our team is comprised solely of certified professionals and former security officers who bring a client perspective to everything that they do..
Center for Internet Security
The Center for Internet Security (CIS) is a 501c3 nonprofit organization that offers cyber security solutions to enhance the security readiness and response of public and private sector entities. The organization produces consensus-based, best practice secure configuration benchmarks and security automation content, and serves as the key cyber security resource for state, local, territorial and tribal governments, including chief security officers, homeland security advisors, and fusion centers.
The Center for Internet Security was founded in 2000 and is based in New York, United States.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.