Cymulate's
Authors

All articles

Cymulate

All articles

Michael Ioffe

Michael has close to 8 years of experience in cybersecurity, with emphasis on offensive techniques, malware analysis, IR, and more. Currently, Michael is Cymulate's senior security researcher, dealing with researching breach techniques and implementing them into automatic attack simulations. Michael is also responsible for developing defense and discovery mechanisms for cyberattacks.

All articles

David Kellerman

Cymulate Customer Success Manager Team Lead, ROW A senior technical customer-facing professional in the field of information and cyber security. David leads customers to success and high-security standards.

All articles

Greg Baylis

Greg is the country manager of UK & Ireland for Cymulate.  He draws on over 20 years of experience in IT security and has worked for a wide range of vendors, public sector entities, and enterprise organizations to deliver best-in-class cybersecurity solutions. Greg is currently working with CIOs, CISOs, and CSOs to deliver cybersecurity solutions that meet their organization’s specific business objectives; whilst demonstrating his philosophy to prove and deliver value, improve the user experience and reduce risk.

All articles

Ilan Kalendarov

Ilan Kalendarov is a security researcher at Cymulate focused primarily on Windows research. Previously he worked as a red teamer for the Israel Defense Forces. Ilan is passionate about defense evasion tactics and how Windows internals work.

All articles

Carolyn Crandall

Chief security advocate and CMO, Carolyn is a high-impact technology executive with over 30 years of experience in building new markets and successful enterprise infrastructure companies. She has a demonstrated track record of effectively taking companies from pre-IPO through to multibillion-dollar sales and has held leadership positions at Cisco, Juniper Networks, Nimble Storage, Riverbed, and Seagate.

All articles

Gal Yaniv

Gal is a member of Cymulate’s SecDev team. He develops new Linux and Mac scenarios for the endpoint security module in Cymulate’s platform. Before joining Cymulate, Gal worked on improving EDR engines' ability to detect malware. Today, armed with that knowledge, he is trying to bypass their defenses.

All articles

Yanai Zohar Lesser

A senior finance executive (MBA, CPA) with over 15 years of experience in executive finance roles, including seven years at Payoneer as the senior global finance director. Yanai's out-of-the-box problem-solving skills are backed by his robust analytical skills and business-orientated mind.

All articles

Shahar Perets

Shahar Perets has over a decade of experience serving as CISO in large companies, including ORIAN Logistic Group, where he also acted as CTO, and NOVOLOG Health Care group, where he also acted as IT director, and Maccabi-Dent. Shahar’s deep understanding of the security impact of people, procedures, and processes, both globally and in day-to-day management, is invaluable in consistently maintaining optimal security effectiveness.

All articles

Elad Beber

Elad Beber is Cymulate’s vulnerability researcher - a cybersecurity expert who specializes in cloud environments and low-level reverse engineering. Before joining Cymulate, Elad worked as an offensive mobile security researcher, and he holds a B.Sc degree in Computer Science from HIT. Elad is a professional in solving CTFs and he is a member of the CamelRiders CTF team.

All articles

Jessica LaBouve

Jes is currently a red team specialist at Cymulate, a series C startup with an extended security management platform that enables companies to challenge, assess, and optimize their cybersecurity posture continuously. Her responsibilities include showcasing and developing the platform’s open framework for automated red teaming capabilities to build repeatable, reoccurring offensive security assessments.

All articles

Ruben Jami

Ruben Jami is a software engineer for Cymulate and has spent 6 years here helping organizations optimize their cybersecurity controls.

All articles

Yoni Leitersdorf

Coding since age six, Yoni's enthusiasm for automation and cybersecurity has strongly influenced his career. Yoni previously served at the world-renowned IDF 8200 unit, where he managed a team of cyber experts and won the esteemed Israeli Security Prize given by the president.

All articles

Yonatan Machluf

Yonatan Machluf is Cymulate’s security research team lead. A cybersecurity professional with over a decade of experience, Yonatan is dedicated to high-quality research in a variety of areas including active directory research, malware development, and evasion techniques.

All articles

Dan Lisichkin

Dan is Cymulate's threat hunter and threat intelligence researcher. Analytical, self-taught, a quick learner, and a team player, Dan is a proud member of the Curated Intelligence community.

All articles

John Starnes

John Starnes is Cymulate's director of technology & strategic alliances. John is an experienced IT security expert with a demonstrated history of working in cybersecurity risk consulting and security operations team management. He's skilled in security governance and strategy, with broad knowledge and experience across all security domains. has comprehensive knowledge and expertise across all security domains.

All articles

Avigayil Stein

Avigayil is a product marketing manager at Cymulate. With a background in marketing B2B SaaS products, she is fascinated by the world of cybersecurity and aspires to spread the word about the benefits of a continuous security assurance program.

All articles

Andrew Barnett

A cyber security leader with over 20 years of experience, Andrew has built a career combining business, technical, and sales acumen. He was most recently the vice president of strategic alliances and service integrators for Qualys, developing the go-to-market approach for partners and service providers. Previously, Andrew was a senior manager in Deloitte’s cyber risk services practice, leading IT risk and security management consulting services for Fortune 500 clients and building Deloitte’s breach and attack simulation solutions.

All articles

Arien Seghetti

Arien is a senior solution architect with 20 years’ experience in IT. Over the past 20 years Arien has worked on all 7 continents delivering network security services. He has also been in a leading role in building out some of the largest projects in the world including the largest laser in the world and the largest wireless deployment for Las Vegas servicing 60k users on day one.

All articles

Avihai Ben-Yossef

Avihai is the co-founder and CTO of Cymulate. He started his career in an intelligence unit of the IDF in a leading technological role. Prior to Cymulate, Avihai was the head of the cyber research team at Avnet Cyber & Information Security, where he worked on several projects on behalf of the Israeli Ministry of Defense.

All articles

Aviva Kochavi 

Aviva is Cymulate’s digital communication specialist. Aviva has spent over a decade working for various news outlets and corporations including The Baltimore Sun, Fox News, Capital News Service and the New York City Law Department. She currently writes about tech and cybersecurity. She holds a BA in Journalism from the University of Maryland.

All articles

Ben Zilberman

Ben Zilberman is Cymulate’s Director of Product Marketing. Ben has a diverse experience of over a decade in cybersecurity, where he has led channel programs and sales operations teams as well as product marketing. Ben holds a BA in Economics and a MBA from Tel Aviv University.

All articles

Critt Golden

Critt Golden is the Vice President of Business Development here at Cymulate. At Cymulate, He is responsible for building, reviewing, and managing the AMPLIFY product line and pre-sales engineering for North America. Critt has over 24 years of experience in cybersecurity at many different levels, from engineering to management, and brings tremendous passion to projects. Critt has been in the security validation space for almost 6 years, formerly with Mandiant. Critt is a proud husband and father of two that enjoys spending time outside enjoying nature.

All articles

Cymulate Research Lab

Our highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military, and intelligence experience. Continuously examining the cyber-threat landscape, our experts deliver in-depth visibility into today’s threats and the actors behind them.

All articles

Dan Baylis

Dan heads up Security Operations at Quilter, overseeing all aspects of security operations including security breach attack simulation, security incident and vulnerability management for all areas of the Quilter group. Dan has over 20 years’ experience of leading Security, IT and IT Risk Management & Operational Resilience functions for multiple sectors including financial services, healthcare and retail.

All articles