Founded Year

2017

Stage

Incubator/Accelerator | Alive

Total Raised

$153M

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

-130 points in the past 30 days

About CyCognito

CyCognito focuses on exposure management in cybersecurity. The company provides a platform for discovering, testing, and prioritizing security risks, allowing organizations to identify and address vulnerabilities in their attack surface. CyCognito's services are aimed at large enterprises with offerings related to software supply chain security and subsidiary risk monitoring. It was founded in 2017 and is based in Palo Alto, California.

Headquarters Location

228 Hamilton Avenue 3rd Floor, Suite 300

Palo Alto, California, 94301,

United States

510-671-5823

Loading...

CyCognito's Product Videos

ESPs containing CyCognito

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTH ➡MARKET STRENGTH ➡LEADERHIGHFLIEROUTPERFORMERCHALLENGER
Enterprise Tech / Cybersecurity

The penetration testing services market offers a range of solutions designed to assess the security posture of an organization's IT systems, applications, and networks. Penetration testing services simulate real-world cyber-attacks to identify vulnerabilities and weaknesses in an organization's security defenses. By leveraging these services, businesses can gain a comprehensive understanding of th…

CyCognito named as Outperformer among 15 other companies, including Cisco, Palo Alto Networks, and CrowdStrike.

CyCognito's Products & Differentiators

    The CyCognito Platform and it is a standalone SaaS solution.

    We help security teams find and focus on the critical attack vectors that are related to external sensitive assets and are exploitable. The CyCognito platform takes the attackers’ perspective in discovering assets and use NLP and ML technologies to provide business context to assets. Business context helps organizations understand which assets belong to the right department owners, and what risks and attack paths the assets expose. Our automated security testing tests every single asset found and does this continuously giving customers ~90% testing coverage. Assets that are considered at risk are given a prioritization grade based on multiple inputs, thus shirking the most critical to the handful that needs to be addressed immediately. Remediation steps and threat intelligence reduce MTTR from months to weeks.

Loading...

Research containing CyCognito

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned CyCognito in 1 CB Insights research brief, most recently on Jul 28, 2023.

Expert Collections containing CyCognito

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

CyCognito is included in 1 Expert Collection, including Cybersecurity.

C

Cybersecurity

11,227 items

These companies protect organizations from digital threats.

Latest CyCognito News

CyCognito Research Reveals More Than Half of Enterprise External Assets Lack Web Application Firewall (WAF) Protection

Sep 9, 2025

CyCognito Research Reveals More Than Half of Enterprise External Assets Lack Web Application Firewall (WAF) Protection September 2025 by CyCognito CyCognito released new research uncovering critical gaps in enterprise web application firewall (WAF) coverage. The report, based on analysis of more than 500,000 internet-exposed assets from Forbes Global 2000 companies, found that over half of enterprise cloud assets (52.3 percent) and nearly two-thirds of off-cloud assets (66.4 percent) lack WAF protection. Considered table stakes in application security, WAFs are a baseline safeguard assumed to be in place across all business-critical applications. CyCognito’s research shows that this assumption is dangerously misplaced. Even among the world’s most iconic enterprises, investigators identified high-traffic applications without WAF protection, including pages that collect personally identifiable information (PII) such as login portals, registration forms, and checkout pages. Key Findings – Widespread Gaps Across Cloud and Off-Cloud Assets: More than half of cloud-hosted enterprise assets lacked WAF protection, with off-cloud assets faring worse. – Exposure of Sensitive Data: Nearly 40 percent of PII-collecting assets in cloud environments and 63.4 percent of off-cloud PII-collecting assets had no WAF coverage. – Fragmented Deployments: On average, enterprises operated 12 different WAF products (median of 11), with some deploying more than 30. This sprawling mix of technologies, often managed by separate teams, creates inconsistent coverage and leaves assets exposed. – Evidence from Global Enterprises: Manual review of traffic across a dozen leading enterprises in industries such as finance, retail, and media revealed multiple high-traffic applications operating without WAF protection, sometimes alongside fully protected flagship applications. “The findings of this research identify security gaps that organizations must take action on. It’s not that enterprises do not lack WAFs, they lack consistent implementation,” said Zohar Venturero, Data Scientist at CyCognito. “Fragmented deployments, siloed security practices, and the challenge of unknown assets make it nearly impossible for organizations to achieve full coverage. This leaves sensitive systems open to credential stuffing, injection attacks, and exploitation of unpatched vulnerabilities.” CyCognito research attributes many of these gaps to organizational complexity rather than technology limitations. Years of overlapping procurement and decentralized management have resulted in enterprises running dozens of different WAFs without a unified deployment framework. This fragmentation means that even high-value applications can slip through the cracks, leaving businesses exposed to attacks. From the findings of this research, CyCognito expects that enterprises will rethink their assumptions about coverage. Most security leaders believe WAFs are in place everywhere they need to be, but the data shows that isn’t the case. Organizations should acknowledge the potential for this visibility gap and realize that not every external-facing asset is actually protected, even inside well-resourced companies. “WAFs still play a critical role in protecting enterprise applications, end users and sensitive data. Our hope is that these insights empower security leaders to re-evaluate their coverage strategies and close the gaps before attackers find them,” added Venturero.

CyCognito Frequently Asked Questions (FAQ)

  • When was CyCognito founded?

    CyCognito was founded in 2017.

  • Where is CyCognito's headquarters?

    CyCognito's headquarters is located at 228 Hamilton Avenue, Palo Alto.

  • What is CyCognito's latest funding round?

    CyCognito's latest funding round is Incubator/Accelerator.

  • How much did CyCognito raise?

    CyCognito raised a total of $153M.

  • Who are the investors of CyCognito?

    Investors of CyCognito include Atos Scaler Accelerator, UpWest, Lightspeed Venture Partners, Sorenson Ventures, Accel and 14 more.

  • Who are CyCognito's competitors?

    Competitors of CyCognito include spiderSilk, SixMap, Hadrian, Pentera, Assetnote and 7 more.

  • What products does CyCognito offer?

    CyCognito's products include The CyCognito Platform and it is a standalone SaaS solution. and 1 more.

Loading...

Compare CyCognito to Competitors

Cymulate Logo
Cymulate

Cymulate operates within the security validation domain, offering a platform for security validation, tools for breach and attack simulation, continuous red teaming, and exposure analytics to help organizations identify and address vulnerabilities. The solutions challenge and optimize cybersecurity measures across various sectors, including enterprise IT and managed security services. It was founded in 2016 and is based in Tel Aviv, Israel.

AttackIQ Logo
AttackIQ

AttackIQ offers breach and attack simulation products for security control validation within the cybersecurity industry. It emulates adversary tactics, techniques, and procedures, aligning with the MITRE ATT&CK framework, to provide insights into security program performance and offer data-driven analysis and mitigation guidance. Its solutions cater to sectors, including energy, financial services, healthcare, and federal organizations. It was founded in 2013 and is based in Los Altos, California.

Pentera Logo
Pentera

Pentera provides Automated Security Validation in the cybersecurity industry. The company has a platform that allows organizations to test the integrity of their cybersecurity layers and identify security exposures. Pentera's services apply to various sectors, focusing on security measures and cyber exposure. It was founded in 2015 and is based in Petah Tikva, Israel.

NetSPI Logo
NetSPI

NetSPI focuses on penetration testing, attack surface management, and breach and attack simulation services across various sectors. The company provides services including application, network, cloud, and mainframe security, as well as secure code reviews and SaaS security assessments, to identify and address security vulnerabilities. NetSPI serves sectors that require strong cybersecurity measures, such as financial institutions, healthcare, and technology companies. It was founded in 2001 and is based in Minneapolis, Minnesota.

Axonius Logo
Axonius

Axonius provides cybersecurity solutions focusing on cyber asset attack surface management (CAASM) and SaaS management. The company offers asset inventory, policy validation, and enforcement to address threats and manage risks, supported by an asset data model. Axonius's platform integrates with various data sources to automate response actions and inform business strategy. It was founded in 2017 and is based in New York, New York.

Praetorian Logo
Praetorian

Praetorian operates as a cybersecurity company specializing in offensive security services and continuous threat exposure management. It offers a suite of solutions including attack surface management, vulnerability management, breach and attack simulation, and red teaming exercises to identify and remediate exploitable vulnerabilities. It serves various sectors with a focus on providing deep cybersecurity expertise to defend against sophisticated attacks. It was founded in 2010 and is based in Austin, Texas.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.