Saturday, September 7, 2024
HomeAcquisitionResilience to Acquire BreachQuest for an undisclosed price

Resilience to Acquire BreachQuest for an undisclosed price

Published on

In a strategic move to enhance its cyber risk management capabilities, Resilience has announced the acquisition of BreachQuest, an innovative incident response technology firm.

This acquisition marks a significant step in Resilience’s efforts to combat the escalating threat of Business Email Compromise (BEC) attacks and other cyber threats.

Strengthening Defenses Against Cyber Threats

BreachQuest is renowned for its cutting-edge platform that integrates seamlessly into cloud office systems, providing invaluable insights for incident forensics and expediting response efforts.

- Advertisement - EHA
Document
Live Account Takeover Attack Simulation

How do Hackers Bypass 2FA?

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks.

Integrating BreachQuest’s technology into Resilience’s cyber risk management software is expected to significantly enhance incident response mechanisms, particularly against BEC attacks, which have become a significant concern in the digital landscape.

BEC attacks have increased, with the U.S. Government’s Internet Crime Complaint Center (IC3) reporting losses exceeding $2.7 billion in 2022.

In 2023, these incidents ranked as the second leading cause of financial loss for Resilience clients, highlighting the urgent need for advanced risk management strategies.

Shaun Gordon, co-founder and CEO of BreachQuest, expressed pride in his team’s work and enthusiasm for scaling their mission through integration with Resilience’s software.

“Resilience shares our mission in helping improve a client’s cyber resilience and lowering the impact of costly cyber incidents,” Gordon stated, emphasizing the synergy between the two companies’ approaches to incident management.

Vishaal “V8” Hariprasad, co-founder and CEO of Resilience, highlighted the growing sophistication of cybercriminals, particularly with the advent of generative AI technologies.

“Cybercriminals are becoming smarter and faster in executing business email compromise, and with the addition of tools like generative AI, the threat is only growing,” Hariprasad said.

He expressed excitement about welcoming BreachQuest to Resilience, noting that their team and technology have been proven to reduce the financial impact of their clients’ cyber risks.

Enhancing Incident Preparedness

The acquisition of BreachQuest is part of Resilience’s broader strategy to adapt to evolving cyber threats and enhance incident preparedness.

This move follows a period of significant expansion for Resilience, underscoring the company’s commitment to leveraging data and technology to stay ahead of cyber adversaries.

Tim Riley, SVP of Business Development at Resilience, highlighted client benefits, emphasizing the synergy between BreachQuest’s platform and Resilience’s proactive incident management approach.

This collaboration is expected to reduce the financial impact of cyber threats for clients, further enhancing their security posture in the face of evolving digital risks.

In conclusion, acquiring BreachQuest by Resilience significantly advances the fight against cyber threats.

By integrating BreachQuest’s innovative technology into its cyber risk management software, Resilience aims to provide its clients with enhanced protection against the growing menace of BEC attacks and other cyber risks.

This strategic move demonstrates both companies’ shared commitment to improving cyber resilience and lowering the impact of costly cyber incidents.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...