HYAS Appoints Technologist and Software Industry Veteran Dr. David Ratner as CEO

HYAS, the pioneer of pre-zero-day cybersecurity, identifying risk before an attack happens and the bad actors behind the attacks, today announces the appointment of software industry veteran and technologist David Ratner, Ph.D. to the position of CEO.

HYAS Named 2020 TAG Cyber Distinguished Vendor 

HYAS, a provider of attribution intelligence and solutions that help cybersecurity teams identify specific threats targeting their organization and the adversaries behind them, announces today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual.

Krebs on Security: The Rise of “Bulletproof” Residential Networks

Brian Krebs examines how cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Traditionally, those connections have been mainly hacked computers, mobile phones, or home routers. But this story is about so-called “bulletproof residential VPN services” that appear to be built by purchasing or otherwise acquiring discrete chunks of Internet addresses from some of the world’s largest ISPs and mobile data providers.

Comox Maltego Transforms on the Hub!

We are very excited to let you know that Maltego transforms for all your favourite Comox data sets are on the Maltego Partner Hub.

HYAS Adds Infosec Visionary Ariel Silverstone as Data Protection Officer, Secures Funding From Susa Ventures

HYAS, a leading provider of attribution intelligence solutions for infosec and cybersecurity professionals, today announced that long-time industry visionary and investor, Ariel Silverstone, has joined as Data Protection Officer. Building on the momentum of its recent $6.2 million Series A round led by M12, Microsoft’s venture fund, the company has also secured additional funding from […]

Cyber Attribution for Enterprise

The reason I bring this up is that the familiar cyber security concept of attribution can be done the hard or easy way – although for most organizations, the choice is pre-made. Specifically, the relatively straightforward way to establish attack origin is to use a snitch, leak, or tap – and if you’re NSA, then this is how you would do it. But if you’re the rest of us, then you must rely on more complex technical clues to determine accurate attribution.

Microsoft Pours Millions into Startup that Nails Cybercriminals

Chris Davis, Hyas’s CEO and cofounder, describes his company’s mission as providing “to-the-doorstep attribution,” meaning that it pinpoints attackers’s whereabouts and helps law enforcement apprehend them. “My drive is to locate the bad guy,” he tells Fortune.

Next Generation of Information Security Technology meets the demands of growing Cybersecurity Sector

As the global economy becomes increasingly digital, the importance of protecting organizations against cyber attacks continues to grow. WINN will help HYAS Infosec Inc. – a Vancouver Island-based information security firm – to commercialize their next generation cybersecurity platform while creating new economic opportunities and employment in the fast-growing threat intelligence sector right here in B.C.

Uncovering The Cyberattacker, Not Just The Cyberattack

Corporates around the world are expected to spend an estimated $96 billion on cybersecurity efforts this year, but with cybercriminals continuing to rake in the money, that spend may be in vain. It’s a fact that Jeff Spencer, COO of cybersecurity firm HYAS, described as “sad.”

Cybersecurity Pioneer HYAS Raises $6.2M Series A Round Led By M12

HYAS, a leading provider of attribution intelligence tools for infosec and cybersecurity professionals…

Attribution Intelligence: Illuminating the Shadows

HYAS doesn’t like letting bad guys get away. For three years, we’ve been working on something that helps law enforcement and intelligence analysts nail them to the wall.

10 to Watch 2018: HYAS Infosec

Despite security breaches like the Equifax fiasco, the information security industry has made only marginal improvements in protecting users and networks.