CYE’s cover photo
CYE

CYE

Computer and Network Security

Herzliya, Israel 15,359 followers

About us

CYE’s exposure management platform transforms the way security teams protect their organizations. With CRQ at its core, the platform reveals enterprises’ exposure in financial terms, visualizes the most exploitable attack routes to critical business assets, and creates mitigation plans tailored to each business. CYE’s customized reporting enables the sharing of vital board-level metrics and validating exposure management over time. In addition, CYE improves cybersecurity maturity by mapping weaknesses and defining targets based on industry frameworks. Founded in 2012, with headquarters in Israel and operations around the world, CYE is funded by EQT and 83North.

Website
https://cyesec.com/
Industry
Computer and Network Security
Company size
201-500 employees
Headquarters
Herzliya, Israel
Type
Privately Held
Specialties
Strategic consulting, CISO as a Service, Security assessment, Red-team risk management, Cybersecurity optimization, Cybersecurity training, Secure development lifecycle, Organizational cybersecurity maturity improvement, Real-time crisis management and incident response, Security due diligence, Cyber Risk Quantification, Cybersecurity, CRQ, Cyber Risk Management, Vulnerability Management, Cyber Risk Quantification and Management, Cyber Risk Assessment, Cybersecurity Maturity Index, Cyber Risk Scoring, Breach Likelihood, Machine Learning, Attack Routes, CTEM, and Cyber Exposure

Products

Locations

Employees at CYE

Updates

  • View organization page for CYE

    15,359 followers

    SOC burnout is no longer just an HR issue, it’s a security issue. A newly published TechTarget feature on improving the SOC analyst experience highlights a growing reality: better security starts with reducing noise, optimizing workflows, and helping analysts focus on what actually matters. Proud to see Tom Levi contributing to this conversation, reinforcing Cye’s belief that clarity and prioritization are essential for stronger, more sustainable security operations. Less alert fatigue. More meaningful action. Read the full article here: https://lnkd.in/d3CGusqe

  • View organization page for CYE

    15,359 followers

    Investor? Cyber risk isn’t evenly distributed across your portfolio, but most tools treat it that way. Cye’s heatmap changes that. See which companies carry the highest exposure. Understand how attackers would actually move. And quantify the financial impact behind every risk. With Cye AI, you can go deeper, ask any question about your portfolio and get instant, contextual answers grounded in real data. Because governance isn’t about more dashboards. It’s about knowing where to act, and why. https://lnkd.in/dc5UUxP2 #CyeAI

  • View organization page for CYE

    15,359 followers

    Nothing about independence here is linear. Plans change. Reality shifts. You adjust- quickly. After a while, that stops being unusual. It’s just how things work. Same reason cybersecurity isn’t about perfection - it’s about knowing how to operate when things don’t go as planned. From all of us at Cye, have a great Independence Day 🇮🇱

    • No alternative text description for this image
  • View organization page for CYE

    15,359 followers

    AI is everywhere - but that’s not new. Cye has been building with AI from day one - not new either. What is new is what we’re doing next. Dr. ‏Nimrod Partush‏ is stepping into the role of Chief Innovation & AI Scientist leading the next phase of our AI capabilities. This isn’t a new direction for us - it’s a natural progression. We’ve always invested in deep data science to model cyber exposure in real environments. What’s changing now is how far we can take it - extending AI from insight into action. From prioritizing and creating mitigation plans to autonomous execution by trusted agentic AI. Grounded in real context. Reflecting how attackers actually operate. And built to support faster, more confident decisions. No AI Sparkles. Just AI that actually does the work. https://lnkd.in/dj3En7Dc

  • View organization page for CYE

    15,359 followers

    𝗠𝗲𝗲𝘁 𝗖𝗵𝗲 𝗦𝗮𝗰𝗸𝘀𝘁𝗲𝗶𝗻 𝗗𝗙𝗜𝗥 𝗔𝗻𝗮𝗹𝘆𝘀𝘁 𝗮𝘁 𝗖𝗬𝗘 Ché’s path into cybersecurity didn’t start in a typical way. Originally from South Africa, she was first exposed to the field back in school, where she studied computer science and developed an early interest in technology. At 18, she moved to Israel, and encouraged by her mother, decided to take a short cyber course. That decision ended up shaping her career. Today, Ché is part of Cye’s Digital Forensics and Incident Response team. Her role focuses on investigating cyber incidents end-to-end, helping organizations understand what happened and how to respond. It’s a fast-moving, high-responsibility environment, and one that constantly pushes her to learn. “𝗜 𝗹𝗲𝗮𝗿𝗻 𝘀𝗼𝗺𝗲𝘁𝗵𝗶𝗻𝗴 𝗻𝗲𝘄 𝗲𝘃𝗲𝗿𝘆 𝗱𝗮𝘆. 𝗘𝘃𝗲𝗿𝘆 𝗰𝗮𝘀𝗲 𝗶𝘀 𝗱𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁, 𝗮𝗻𝗱 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱 𝘁𝗼 𝘂𝗻𝗱𝗲𝗿𝘀𝘁𝗮𝗻𝗱 𝗲𝘃𝗲𝗿𝘆𝘁𝗵𝗶𝗻𝗴, 𝗻𝗼𝘁 𝗷𝘂𝘀𝘁 𝗼𝗻𝗲 𝗻𝗶𝗰𝗵𝗲.” One of her recent achievements includes developing a detailed investigation methodology for macOS environments, an area that is still less explored compared to Windows. It’s a strong reflection of how she approaches her work: exploring complex, underdeveloped areas with focus and precision. Beyond the technical side, Ché highlights the people as a big part of the experience. “𝗪𝗲’𝗿𝗲 𝗮 𝘆𝗼𝘂𝗻𝗴 𝘁𝗲𝗮𝗺, 𝘃𝗲𝗿𝘆 𝗰𝗹𝗼𝘀𝗲. 𝗕𝘂𝘁 𝗺𝗼𝗿𝗲 𝘁𝗵𝗮𝗻 𝘁𝗵𝗮𝘁, 𝘆𝗼𝘂’𝗿𝗲 𝘀𝘂𝗿𝗿𝗼𝘂𝗻𝗱𝗲𝗱 𝗯𝘆 𝗽𝗲𝗼𝗽𝗹𝗲 𝘆𝗼𝘂 𝗰𝗮𝗻 𝗹𝗲𝗮𝗿𝗻 𝗳𝗿𝗼𝗺 𝗮𝗹𝗹 𝘁𝗵𝗲 𝘁𝗶𝗺𝗲.” Working in cybersecurity has sharpened her perspective on digital safety. “𝗔 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗼𝗻𝗹𝘆 𝗮𝘀 𝘀𝘁𝗿𝗼𝗻𝗴 𝗮𝘀 𝗶𝘁𝘀 𝘄𝗲𝗮𝗸𝗲𝘀𝘁 𝗹𝗶𝗻𝗸.” Outside of work, she keeps things balanced by staying active, spending time with friends, and experimenting in the kitchen, alongside her Computer Science studies. Looking ahead, Ché is also interested in contributing to the broader cybersecurity community by sharing knowledge and tools, something she sees as a natural part of the field.

    • No alternative text description for this image
  • View organization page for CYE

    15,359 followers

    Proud to see our own Mor David recognized by SpecterOps as a standout community member.

    View organization page for SpecterOps

    32,099 followers

    Congratulations to our inaugural Top Dogs honorees! The Top Dogs program recognizes and rewards community members outside SpecterOps who meaningfully advance the practice of Attack Path Management (APM). Recipients contribute through research, operational guidance, theory, tooling, or community education that deepens understanding of identity risk and helps organizations successfully implement and operationalize APM. A round of applause for Tom O'Neill, Mor David, Javier Azofra Ovejero, HD Moore, and Kaden B. 👏

  • View organization page for CYE

    15,359 followers

    When were you last able to compare cyber exposure across all your subsidiaries, with financial impact clearly visualized? For most group-level security leaders, the answer is “never.” That’s why we wrote our new post on ending siloed security with AI-driven, group-level exposure management. Spoiler: it starts with a single view. Read more: https://lnkd.in/dJX_qi7W

    • No alternative text description for this image
  • View organization page for CYE

    15,359 followers

    Hasbro reported unauthorized access to its network, with recovery expected to take weeks. Where are the Transformers when you need them? Despite taking some systems offline, operations continue. Orders are processed. Products are shipped. Not because they avoided the attack, but because they were ready for it. They had the planning and controls in place that allowed them to handle a cyber incident without it escalating into a full operational crisis. That’s the real takeaway. Most organizations still build their security around prevention. But incidents are no longer a question of if. A few practical reminders: 🤖 Plan for failure, not just defense Assume access will be gained. Define what happens next. 🤖 Test your business continuity, not just your security stack Run simulations that involve operations, not only IT. 🤖 Prioritize critical processes Know what must keep running and protect those flows first. 🤖 Segment systems and access Limit how far an incident can spread when it happens. 🤖 Align cyber with business impact Recovery time isn’t just technical, it’s financial and operational. The difference isn’t who gets breached. It’s who’s built to keep going when it happens. Because cybersecurity isn’t child’s play (even for a toy company) https://lnkd.in/dpiiVmsm #BreachBite

    • No alternative text description for this image
  • View organization page for CYE

    15,359 followers

    In a recent RSA 2026 recap by Dorene Rettas for Cyber Security Tribe Magazine, our CEO Reuven (Rubi) Aronashvili shares a grounded perspective on one of the industry’s biggest challenges: turning exposure into actionable business risk. From overload of findings to lack of prioritization, the gap isn’t technical, it’s contextual. The shift is clear: From lists of vulnerabilities → to real attack paths From severity scores → to financial impact From noise → to decision-making As AI accelerates time-to-exploit, execution matters more than ever. The question is no longer what’s critical, but what actually puts the business at risk. Worth a read for anyone thinking about how to move from data to decisions > https://lnkd.in/d8X2Z3D4

  • View organization page for CYE

    15,359 followers

    Spring is a time for renewal. Whether you’re hiding eggs or hunting for afikoman, make sure your critical assets aren't hiding in plain sight. Let Cye help you see your blind spots and give your security posture a fresh start. Happy Passover and Easter from all of us 🌸

Similar pages

Browse jobs

Funding

CYE 2 total rounds

Last Round

Series A

US$ 120.0M

Investors

EQT
See more info on crunchbase