Contact us
Request demo →
Contact us

When paths merge

by Cybersprint 23 Feb 2022

When I founded Cybersprint in 2015, I had the vision of bringing security technology from terminals to the boardroom – cybersecurity needed to be elevated to allow management to make the right decisions supported by holistic insights.

From 2010 to 2015 cybersecurity investments were still focusing on protecting the internal ecosystem of organizations. The transition to cloud was under way without involvement of security teams, and without adhering to hardening policies or security guidelines.

In 2015 we developed our vision of looking at organizations purely from an outside perspective. We started building our ASM platform which provides those outside-in insights as a service.

The people at Cybersprint have always had a passion for security, even before we called it cybersecurity – some having worked in the area for almost 25 years. In these years they have shaped the industry and contributed in many forms to the wider hacking community.

An outside-in perspective

In all of Cybersprint's services the outside-in perspective has been pivotal: we offer an outside-in “zero scope” approach to mapping the attack surface. This meant that whenever someone has interest in our solution, we would just run a demonstration and share compelling insights with the organization – giving them the hacker’s perspective on themselves. If we can see it, anyone with time and money can see it too. Just be sure to outsmart your adversaries by automating this process instead of relying on manual work.

Automate before the attackers do

Automation is key to survival. The number of attacks, alerts and incidents will only increase, so automation must happen or SOC teams will drown in data and perish through data-fatigue – if you can get the people. At Cybersprint, we do not want to create more work for our clients but instead want to make them more efficient so they can focus on tactical security instead of operational security. We have extensively automated anything related to the attack surface and fully integrate it with the existing processes and tools the client already has.

Series B fundraising

In Q4 2021 we were fundraising for our series B round. The goal of that round was to accelerate our international go-to-market, as the product has been tested in the market for a couple of years already by high profile clients. During this process, we met with Darktrace leadership and experienced a lot of connections on culture, team, technology, vision and passion for the cybersecurity domain. A joint path has been discovered that exceeds the goals of our series B funding plans.

Towards the same goal from a different starting point

Over the past years, there were various direct and indirect interactions between Cybersprint and Darktrace – mostly through customers telling us, “Darktrace does on the inside what Cybersprint does on the outside”.

Cybersprint has taken the first steps in making the platform AI-ready and implementing the first AI-algorithms in the past 2 years, but the roadmap of algorithms for ASM-AI is large. Darktrace already has a proven track record of applying self-learning AI to solving customer problems, so this is a perfect match.

This merger means the Cybersprint team can accelerate the growth of the business and expose the ASM platform to many more organizations globally. Thinking about people, Cybersprint has a well-functioning technical team that is happy to join Darktrace, to help accelerate the Prevent vision and create something better together.

A strategic view on ASM

The ASM space heating up has not gone unnoticed. The problem of not knowing where your assets are, has been highlighted through high-profile security issues such as Log4j and printnightmare, driving the demand for ASM solutions. In the past 12 months, Cybersprint was approached by a wide range of Cybersecurity companies to join forces – most of them driven by the fear of missing out on this new market.

At Darktrace, they already have complete visibility over the internal data of their customers – their customer’s email environment, SaaS data, operational technology, IoT, network, zero-trust and other coverage areas – but being able to combine those data sets and deriving insights from them will further drive breakthrough innovations.

More to come

In the coming period, the Cybersprint and Darktrace teams will integrate the Cybersprint solution into the Prevent offering. We look forward to updating you again on the evolution of our upcoming Prevent offering. In the meantime, feel free to send any questions you have to

Disinformation: a certainty in uncertain times

Since the beginning of the internet, we have seen a near, if not an exponential, surge of information sharing amongst users in cyberspace. Not long after, we saw how the emergence of social media ushered an access to public online platforms where other internet users worldwide could share, discuss, promote, and consume information, whether by deliberate choice or not.

read more

Threat Report: Remote vulnerability in Confluence, fixes available

On 2 June, 2022 a critical vulnerability was identified in Atlassian Confluence (CVE-2022-26134). The vulnerability in question relates to active exploitation of unauthenticated remote code execution in Confluence Data Center and Server; meaning that the vulnerability could lead to code being executed remotely.  

read more

Looking back on the 2021 vulnerability: Log4shell

In December 2021 a critical vulnerability surfaced named Log4shell within Log4j, a widely used logging tool for java applications. Log4j is used globally by computers running online services, which meant it impacted a multitude of people, organisations, and government organisations. Since then, multiple fixes have been implemented in the hope to avoid such an outbreak in the future.

read more

Do you have a question?

Our experts have the answers

Contact us