Ran Nahmias

Introducing Cyberpion’s Ecosystem Security Partner Program

Introducing Cyberpion’s Ecosystem Security Partner Program

Introducing Cyberpion’s Ecosystem Security Partner Program What is an Ecosystem? While there has been no shortage of headlines regarding cybersecurity events for the past many years, the recent SolarWinds incident highlights the risks inherent in the digital supply chain. Organizations are at risk from many types of cyber attack – but perhaps the most insidious …

Introducing Cyberpion’s Ecosystem Security Partner Program Read More »

Read More...
A Tale of Ethical Disclosures

A Tale of Ethical Disclosures

A Tale Of Ethical Disclosures In many recent conversations I keep talking to family, friends, colleagues and even people in the socially distanced line at the grocery store, about online ecosystem as an emerging (and vast) attack surface. A family member felt somewhat lucky that he was spared doing it in person, over a long …

A Tale of Ethical Disclosures Read More »

Read More...
The Cybersecurity Industry is Waking Up to the Online Ecosystem Attack Surface

The Cybersecurity Industry is Waking Up to the Online Ecosystem Attack Surface

The Cybersecurity Industry Is Waking Up To The Online Ecosystem Attack Surface Several months ago, I was introduced to Cyberpion and the concept of the attack surface that exists in an organization’s online ecosystem. I have worked in cybersecurity for many, many years and yet – this was the first time I had been made …

The Cybersecurity Industry is Waking Up to the Online Ecosystem Attack Surface Read More »

Read More...
Election Ecosystems, How the Two U.S. Political Parties Stack Up

Election Ecosystems, How the Two U.S. Political Parties Stack Up

n this post I’ll walk through the ecosystems of the two major U.S. political parties as examples of government-related ecosystems and provide some insights into their nature, scale, and scope that are produced by our Ecosystem Security platform.

Read More...

Let us
Show You.

What do you really know about the security posture
of your digital ecosystem?

See the risks you’re exposed to with a vulnerability assessment.

Scroll to Top