Skip to main content



    Digital Signatures are the Cyber Security Vulnerability You Need to Stop Ignoring
    Digital Signatures are the Cybersecurity Vulnerability You Need to Stop Ignoring

    Enterprises’ employees and third parties exchange an abundance of confidential documents, both internally and externally, and through a variety of means, including email and file-sharing platforms. These employees and third parties are often advised to secure these documents by attaching a digital signature. A digital signature is a trace attached by the author of a […]

    Apache’s migration to Github: another patch in the centralization wall
    Apache’s migration to Github: another patch in the centralization wall

    Here at CybelAngel, we’ve spent a significant amount of R&D effort focused on protecting our customers from compromises relating to data or credential leaks found on GitHub.  As GitHub’s adoption has continued its meteoric rise, the number of cyber security incidents stemming from credentials, open file paths, and other sensitive data being left accessible in […]

    CybelAngel Adds Ex-FBI Executive Todd Carroll as Vice President of Cyber Operations
    Leveraging My 20+ Years with FBI Cybersecurity

    Why leave a job with comfort, security, authority, and familiarity? As I retired from the FBI after 20+ years of service (and a cumulative 32 years with local law enforcement and military service), I found myself too young to truly “retire” and too concerned to stop caring.

    CybelAngel Adds Ex-FBI Executive Todd Carroll as Vice President of Cyber Operations
    Todd Carroll Ex-FBI Executive Joins CybelAngel

    Former FBI cyber intelligence leader takes on new role focused on helping U.S. enterprises monitor digital threats and data leaks with CybelAngel.

    Third Party and Employee Data Leaks: Cyber Security’s Elephant in the Room
    Third Parties and Employee Data Leak Danger

    Cybersecurity’s Elephant in the Room The cybersecurity industry historically focuses on perimeter defense, including: Developing expertise in criminal activity on the Dark web Recruiting ex-government personnel trained to protect security network Building up protection against malware. The traditional mindset is to keep the internet a safe place, the best way to spend your time is […]

    Real-Time Data Leak Detection with Percolating Technology
    Real-Time Data Leak Detection with Percolating Technology

    Endeavoring to provide our customers with real-time data leak detection, CybelAngel tested the capabilities of Elasticsearch, a distributed, highly scalable, full-text search engine. Specifically, we were interested in the percolating feature of Elasticsearch. Percolating can be described as “reverse search,” in which you ask for all the search queries that match a file, instead of […]