SOC burnout is no longer just an HR issue, it’s a security issue. A newly published TechTarget feature on improving the SOC analyst experience highlights a growing reality: better security starts with reducing noise, optimizing workflows, and helping analysts focus on what actually matters. Proud to see Tom Levi contributing to this conversation, reinforcing Cye’s belief that clarity and prioritization are essential for stronger, more sustainable security operations. Less alert fatigue. More meaningful action. Read the full article here: https://lnkd.in/d3CGusqe
About us
CYE’s exposure management platform transforms the way security teams protect their organizations. With CRQ at its core, the platform reveals enterprises’ exposure in financial terms, visualizes the most exploitable attack routes to critical business assets, and creates mitigation plans tailored to each business. CYE’s customized reporting enables the sharing of vital board-level metrics and validating exposure management over time. In addition, CYE improves cybersecurity maturity by mapping weaknesses and defining targets based on industry frameworks. Founded in 2012, with headquarters in Israel and operations around the world, CYE is funded by EQT and 83North.
- Website
-
https://cyesec.com/
External link for CYE
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Herzliya, Israel
- Type
- Privately Held
- Specialties
- Strategic consulting, CISO as a Service, Security assessment, Red-team risk management, Cybersecurity optimization, Cybersecurity training, Secure development lifecycle, Organizational cybersecurity maturity improvement, Real-time crisis management and incident response, Security due diligence, Cyber Risk Quantification, Cybersecurity, CRQ, Cyber Risk Management, Vulnerability Management, Cyber Risk Quantification and Management, Cyber Risk Assessment, Cybersecurity Maturity Index, Cyber Risk Scoring, Breach Likelihood, Machine Learning, Attack Routes, CTEM, and Cyber Exposure
Products
Locations
-
Primary
Get directions
10 Abba Eben St.
Herzliya, Israel 4672519, IL
Employees at CYE
Updates
-
Investor? Cyber risk isn’t evenly distributed across your portfolio, but most tools treat it that way. Cye’s heatmap changes that. See which companies carry the highest exposure. Understand how attackers would actually move. And quantify the financial impact behind every risk. With Cye AI, you can go deeper, ask any question about your portfolio and get instant, contextual answers grounded in real data. Because governance isn’t about more dashboards. It’s about knowing where to act, and why. https://lnkd.in/dc5UUxP2 #CyeAI
-
Nothing about independence here is linear. Plans change. Reality shifts. You adjust- quickly. After a while, that stops being unusual. It’s just how things work. Same reason cybersecurity isn’t about perfection - it’s about knowing how to operate when things don’t go as planned. From all of us at Cye, have a great Independence Day 🇮🇱
-
-
AI is everywhere - but that’s not new. Cye has been building with AI from day one - not new either. What is new is what we’re doing next. Dr. Nimrod Partush is stepping into the role of Chief Innovation & AI Scientist leading the next phase of our AI capabilities. This isn’t a new direction for us - it’s a natural progression. We’ve always invested in deep data science to model cyber exposure in real environments. What’s changing now is how far we can take it - extending AI from insight into action. From prioritizing and creating mitigation plans to autonomous execution by trusted agentic AI. Grounded in real context. Reflecting how attackers actually operate. And built to support faster, more confident decisions. No AI Sparkles. Just AI that actually does the work. https://lnkd.in/dj3En7Dc
-
𝗠𝗲𝗲𝘁 𝗖𝗵𝗲 𝗦𝗮𝗰𝗸𝘀𝘁𝗲𝗶𝗻 𝗗𝗙𝗜𝗥 𝗔𝗻𝗮𝗹𝘆𝘀𝘁 𝗮𝘁 𝗖𝗬𝗘 Ché’s path into cybersecurity didn’t start in a typical way. Originally from South Africa, she was first exposed to the field back in school, where she studied computer science and developed an early interest in technology. At 18, she moved to Israel, and encouraged by her mother, decided to take a short cyber course. That decision ended up shaping her career. Today, Ché is part of Cye’s Digital Forensics and Incident Response team. Her role focuses on investigating cyber incidents end-to-end, helping organizations understand what happened and how to respond. It’s a fast-moving, high-responsibility environment, and one that constantly pushes her to learn. “𝗜 𝗹𝗲𝗮𝗿𝗻 𝘀𝗼𝗺𝗲𝘁𝗵𝗶𝗻𝗴 𝗻𝗲𝘄 𝗲𝘃𝗲𝗿𝘆 𝗱𝗮𝘆. 𝗘𝘃𝗲𝗿𝘆 𝗰𝗮𝘀𝗲 𝗶𝘀 𝗱𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁, 𝗮𝗻𝗱 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱 𝘁𝗼 𝘂𝗻𝗱𝗲𝗿𝘀𝘁𝗮𝗻𝗱 𝗲𝘃𝗲𝗿𝘆𝘁𝗵𝗶𝗻𝗴, 𝗻𝗼𝘁 𝗷𝘂𝘀𝘁 𝗼𝗻𝗲 𝗻𝗶𝗰𝗵𝗲.” One of her recent achievements includes developing a detailed investigation methodology for macOS environments, an area that is still less explored compared to Windows. It’s a strong reflection of how she approaches her work: exploring complex, underdeveloped areas with focus and precision. Beyond the technical side, Ché highlights the people as a big part of the experience. “𝗪𝗲’𝗿𝗲 𝗮 𝘆𝗼𝘂𝗻𝗴 𝘁𝗲𝗮𝗺, 𝘃𝗲𝗿𝘆 𝗰𝗹𝗼𝘀𝗲. 𝗕𝘂𝘁 𝗺𝗼𝗿𝗲 𝘁𝗵𝗮𝗻 𝘁𝗵𝗮𝘁, 𝘆𝗼𝘂’𝗿𝗲 𝘀𝘂𝗿𝗿𝗼𝘂𝗻𝗱𝗲𝗱 𝗯𝘆 𝗽𝗲𝗼𝗽𝗹𝗲 𝘆𝗼𝘂 𝗰𝗮𝗻 𝗹𝗲𝗮𝗿𝗻 𝗳𝗿𝗼𝗺 𝗮𝗹𝗹 𝘁𝗵𝗲 𝘁𝗶𝗺𝗲.” Working in cybersecurity has sharpened her perspective on digital safety. “𝗔 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗼𝗻𝗹𝘆 𝗮𝘀 𝘀𝘁𝗿𝗼𝗻𝗴 𝗮𝘀 𝗶𝘁𝘀 𝘄𝗲𝗮𝗸𝗲𝘀𝘁 𝗹𝗶𝗻𝗸.” Outside of work, she keeps things balanced by staying active, spending time with friends, and experimenting in the kitchen, alongside her Computer Science studies. Looking ahead, Ché is also interested in contributing to the broader cybersecurity community by sharing knowledge and tools, something she sees as a natural part of the field.
-
-
Proud to see our own Mor David recognized by SpecterOps as a standout community member.
Congratulations to our inaugural Top Dogs honorees! The Top Dogs program recognizes and rewards community members outside SpecterOps who meaningfully advance the practice of Attack Path Management (APM). Recipients contribute through research, operational guidance, theory, tooling, or community education that deepens understanding of identity risk and helps organizations successfully implement and operationalize APM. A round of applause for Tom O'Neill, Mor David, Javier Azofra Ovejero, HD Moore, and Kaden B. 👏
-
When were you last able to compare cyber exposure across all your subsidiaries, with financial impact clearly visualized? For most group-level security leaders, the answer is “never.” That’s why we wrote our new post on ending siloed security with AI-driven, group-level exposure management. Spoiler: it starts with a single view. Read more: https://lnkd.in/dJX_qi7W
-
-
Hasbro reported unauthorized access to its network, with recovery expected to take weeks. Where are the Transformers when you need them? Despite taking some systems offline, operations continue. Orders are processed. Products are shipped. Not because they avoided the attack, but because they were ready for it. They had the planning and controls in place that allowed them to handle a cyber incident without it escalating into a full operational crisis. That’s the real takeaway. Most organizations still build their security around prevention. But incidents are no longer a question of if. A few practical reminders: 🤖 Plan for failure, not just defense Assume access will be gained. Define what happens next. 🤖 Test your business continuity, not just your security stack Run simulations that involve operations, not only IT. 🤖 Prioritize critical processes Know what must keep running and protect those flows first. 🤖 Segment systems and access Limit how far an incident can spread when it happens. 🤖 Align cyber with business impact Recovery time isn’t just technical, it’s financial and operational. The difference isn’t who gets breached. It’s who’s built to keep going when it happens. Because cybersecurity isn’t child’s play (even for a toy company) https://lnkd.in/dpiiVmsm #BreachBite
-
-
In a recent RSA 2026 recap by Dorene Rettas for Cyber Security Tribe Magazine, our CEO Reuven (Rubi) Aronashvili shares a grounded perspective on one of the industry’s biggest challenges: turning exposure into actionable business risk. From overload of findings to lack of prioritization, the gap isn’t technical, it’s contextual. The shift is clear: From lists of vulnerabilities → to real attack paths From severity scores → to financial impact From noise → to decision-making As AI accelerates time-to-exploit, execution matters more than ever. The question is no longer what’s critical, but what actually puts the business at risk. Worth a read for anyone thinking about how to move from data to decisions > https://lnkd.in/d8X2Z3D4