Looking back at our journey throughout 2022, CybelAngel has continued to focus on driving its leadership excellence and achieved tremendous progress in our goal of expanding value-added partnerships across all regions and diverse markets, aligning with our channel-first business model. Following is a snapshot of our most prominent channel success stories in 2022: Expanding leadership […]
Posts about Articles
Our cybersecurity predictions for 2023 all fall under one key word: proliferation. CybelAngel’s VP of product strategy, Camille Charaudeau, was recently quoted by both EM360 and BetaNews for his prediction that the expansion of external attack surfaces will be a major cybersecurity business challenge in 2023. What’s driving that expansion is the proliferation of credentials […]
Taking Cybersecurity Beyond the Obvious with EASM In 2005, a group of about 25 people posing as landscapers tunneled into the vault of the Banco Central bank in Fortaleza, Ceará, Brazil, making off with approximately US$71M. It was the largest bank robbery in Brazil’s history and, despite the lack of a cybersecurity breach, it’s also […]
CybelAngel continues to expand into new markets, protect new customers, receive industry accolades, and even meet with global leaders in regard the growing cyber battleground. And as the pinnacle of 2022, we proudly launched our latest External Attack Surface Management Solution (EASMX) for detecting shadow IT, unknown exposures, and preventing digital threats. What can you […]
CybelAngel CEO Erwan Keraudy advances EASM and preemptive cybersecurity with distinguished US and French cybersecurity delegation The French-American Foundation’s 2022 Cyber Security Conference, held November 29 to December 1, brought together nearly 100 leading cyber security experts and thought leaders from France and the U.S. to discuss the most pertinent cyber security challenges from both […]
Do your employees use personal drives to store or share corporate data? Do they forward corporate files to their personal email? Perhaps they’ve created repositories for document gathering and sharing for a joint project with a vendor…or installed a handy little app or extension they found online… If so, congratulations: You’ve probably got shadow IT. […]