Sunday, January 26, 2025
HomeAcquisitionResilience to Acquire BreachQuest for an undisclosed price

Resilience to Acquire BreachQuest for an undisclosed price

Published on

SIEM as a Service

Follow Us on Google News

In a strategic move to enhance its cyber risk management capabilities, Resilience has announced the acquisition of BreachQuest, an innovative incident response technology firm.

This acquisition marks a significant step in Resilience’s efforts to combat the escalating threat of Business Email Compromise (BEC) attacks and other cyber threats.

Strengthening Defenses Against Cyber Threats

BreachQuest is renowned for its cutting-edge platform that integrates seamlessly into cloud office systems, providing invaluable insights for incident forensics and expediting response efforts.

Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Integrating BreachQuest’s technology into Resilience’s cyber risk management software is expected to significantly enhance incident response mechanisms, particularly against BEC attacks, which have become a significant concern in the digital landscape.

BEC attacks have increased, with the U.S. Government’s Internet Crime Complaint Center (IC3) reporting losses exceeding $2.7 billion in 2022.

In 2023, these incidents ranked as the second leading cause of financial loss for Resilience clients, highlighting the urgent need for advanced risk management strategies.

Shaun Gordon, co-founder and CEO of BreachQuest, expressed pride in his team’s work and enthusiasm for scaling their mission through integration with Resilience’s software.

“Resilience shares our mission in helping improve a client’s cyber resilience and lowering the impact of costly cyber incidents,” Gordon stated, emphasizing the synergy between the two companies’ approaches to incident management.

Vishaal “V8” Hariprasad, co-founder and CEO of Resilience, highlighted the growing sophistication of cybercriminals, particularly with the advent of generative AI technologies.

“Cybercriminals are becoming smarter and faster in executing business email compromise, and with the addition of tools like generative AI, the threat is only growing,” Hariprasad said.

He expressed excitement about welcoming BreachQuest to Resilience, noting that their team and technology have been proven to reduce the financial impact of their clients’ cyber risks.

Enhancing Incident Preparedness

The acquisition of BreachQuest is part of Resilience’s broader strategy to adapt to evolving cyber threats and enhance incident preparedness.

This move follows a period of significant expansion for Resilience, underscoring the company’s commitment to leveraging data and technology to stay ahead of cyber adversaries.

Tim Riley, SVP of Business Development at Resilience, highlighted client benefits, emphasizing the synergy between BreachQuest’s platform and Resilience’s proactive incident management approach.

This collaboration is expected to reduce the financial impact of cyber threats for clients, further enhancing their security posture in the face of evolving digital risks.

In conclusion, acquiring BreachQuest by Resilience significantly advances the fight against cyber threats.

By integrating BreachQuest’s innovative technology into its cyber risk management software, Resilience aims to provide its clients with enhanced protection against the growing menace of BEC attacks and other cyber risks.

This strategic move demonstrates both companies’ shared commitment to improving cyber resilience and lowering the impact of costly cyber incidents.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations

The New York State Department of Financial Services (NYDFS) has imposed a $2 million...