
Darklight
A next-generation expert system for knowledge-driven defense automation.
Date | Investors | Amount | Round |
---|---|---|---|
investor investor | €0.0 | round | |
investor | €0.0 | round | |
investor | €0.0 | round | |
investor investor | €0.0 | round | |
* | N/A | Acquisition | |
Total Funding | 000k |
USD | 2019 | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|---|
Revenues | 0000 | 0000 | 0000 | 0000 | 0000 |
% growth | - | 3 % | - | - | - |
EBITDA | 0000 | 0000 | 0000 | 0000 | 0000 |
Profit | 0000 | 0000 | 0000 | 0000 | 0000 |
EV | 0000 | 0000 | 0000 | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
R&D budget | 0000 | 0000 | 0000 | 0000 | 0000 |
Source: Dealroom estimates
Related Content
DarkLight, a cybersecurity firm, was established by John Shearer, a seasoned technologist and serial entrepreneur with a history of founding successful tech ventures, including Powercast. The company was created to leverage artificial intelligence for active cyber defense.
DarkLight developed the Cyio platform, an AI-powered software designed for Continuous Threat Exposure Management (CTEM). This platform assists organizations in identifying, managing, and reporting on cyber risks by fusing and analyzing data from various sources, including network information, threat intelligence, and internal enterprise knowledge. The primary goal of Cyio is to provide a comprehensive view of an organization's cyber risk posture, enabling them to prioritize and manage threats effectively across different devices, software, and networks.
The company operated on a B2B model, providing its software to enterprises seeking to enhance their cybersecurity infrastructure. In a significant development, the Darklight Cyio platform was acquired by Liongard in June 2025, a move that integrated Cyio's capabilities into Liongard's Attack Surface Management (ASM) offerings.
Keywords: cybersecurity, artificial intelligence, cyber risk management, threat exposure management, network security, data fusion, risk analysis, enterprise software, cyber defense, threat intelligence