Disrupting BAS with Attack Path Management

Situation: Originally slotted as just another breach and attack simulation player, XM Cyber sought to disrupt the market and establish itself as an Attack Path Management first mover. Strategy: The PR program leveraged news, thought leadership, research, and analysts to develop the need and convey the benefits of the company’s IP, which uniquely captures the […]
Leading the Path to Combined Secure Video Conferencing and Blockchain
Situation: COVID accelerated the adoption of video conferencing technologies, bringing to light the security vulnerabilities within them and the need for a secure alternative. Only SafeVchat (now Zerify) was able to bring a cyber–built video conferencing platform to the market. Strategy: The PR program leveraged news, thought leadership, research, and analysts to develop the need […]
IOT Device Security – At Scale

Situation: Fusion’s mission was to launch and build market visibility for SecuriThings, the first pure-play IoT security solution that enabled real-time visibility and control. Facing much noise, competition and confusion in the space, we had to find a way to clearly communicate the company’s differentiators and secure media and analyst coverage that would move the […]
Blazing a trail in Zero-trust Hardware Access Control

Situation: With the world focused on network security and software exploits, Sepio sought to draw attention to the perils of hardware-based attacks. Strategy: Our PR program flagged this “soft underbelly” of cyber. We highlighted James Bond-like threats from everyday devices – and Sepio’s unique ability to track and control hardware from L1 “fingerprints.” Results: We […]
Writing the Book on Cyber Protection

Situation: Boardrooms and senior management teams often do not fully appreciate, or don’t want to recognize, the dangers presented by cyber threats. This may be because it seems overwhelming; there is fear and a lack of defined process. Vigitrust wrote the book on helping major companies through this, both literally and through their business model. […]
OT/IOT Vulnerability Leadership

Situation: We were tasked with raising industry awareness of new OT/IOT cybersecurity vendor Otorio by securing media coverage of its research into wireless IoT device vulnerabilities, a challenge made immeasurably more difficult by a partnering company’s failure to sign off on the release up until the night before it was to be distributed. Strategy: Knowing […]
OT/IoT Cybersecurity Vendor Series A Funding

Situation: We were given the task of raising industry awareness for Cyolo, a dynamic OT/IoT cybersecurity vendor, for a Series A funding announcement. Our goal was to secure media coverage that highlights the significant investments received by Cyolo. The challenge came from securing top-tier media coverage, as it is difficult to attract significant attention with […]
Servicing Cyber Through Service Providers

Situation: Most consumers don’t want to think about cybersecurity for their homes and devices. That’s why Allot decided to bring their cyber solution (and network acceleration platform) to consumers through service providers. The idea is to make cyber another line item on consumer telecom bills where, for micro-incremental costs, consumers can have full security without […]