Disrupting BAS with Attack Path Management

Situation: Originally slotted as just another breach and attack simulation player, XM Cyber sought to disrupt the market and establish itself as an Attack Path Management first mover. Strategy: The PR program leveraged news, thought leadership, research, and analysts to develop the need and convey the benefits of the company’s IP, which uniquely captures the […]

Leading the Path to Combined Secure Video Conferencing and Blockchain

Situation: COVID accelerated the adoption of video conferencing technologies, bringing to light the security vulnerabilities within them and the need for a secure alternative. Only SafeVchat (now Zerify) was able to bring a cyber–built video conferencing platform to the market. Strategy: The PR program leveraged news, thought leadership, research, and analysts to develop the need […]

IOT Device Security – At Scale

Situation: Fusion’s mission was to launch and build market visibility for SecuriThings, the first pure-play IoT security solution that enabled real-time visibility and control. Facing much noise, competition and confusion in the space, we had to find a way to clearly communicate the company’s differentiators and secure media and analyst coverage that would move the […]

Blazing a trail in Zero-trust Hardware Access Control

Situation: With the world focused on network security and software exploits, Sepio sought to draw attention to the perils of hardware-based attacks. Strategy: Our PR program flagged this “soft underbelly” of cyber. We highlighted James Bond-like threats from everyday devices – and Sepio’s unique ability to track and control hardware from L1 “fingerprints.” Results: We […]

Writing the Book on Cyber Protection

Situation: Boardrooms and senior management teams often do not fully appreciate, or don’t want to recognize, the dangers presented by cyber threats. This may be because it seems overwhelming; there is fear and a lack of defined process. Vigitrust wrote the book on helping major companies through this, both literally and through their business model. […]

OT/IOT Vulnerability Leadership

Situation: We were tasked with raising industry awareness of new OT/IOT cybersecurity vendor Otorio by securing media coverage of its research into wireless IoT device vulnerabilities, a challenge made immeasurably more difficult by a partnering company’s failure to sign off on the release up until the night before it was to be distributed. Strategy: Knowing […]

OT/IoT Cybersecurity Vendor Series A Funding

Situation: We were given the task of raising industry awareness for Cyolo, a dynamic OT/IoT cybersecurity vendor, for a Series A funding announcement. Our goal was to secure media coverage that highlights the significant investments received by Cyolo. The challenge came from securing top-tier media coverage, as it is difficult to attract significant attention with […]

Democratizing Cybersecurity for All: SOC Platform

Situation: Having access to cutting-edge cybersecurity protection and solutions is a right, not a privilege. CYREBRO sought to disrupt the market and democratize cybersecurity for businesses of all sizes. Strategy: The PR program leveraged news, thought leadership, research, and analysts to develop the need and convey the benefits of the company’s IP, which uniquely equips […]

Reaching Giraffic Heights with Video

Situation: It was 2016, and over-the-top (OTT) video was the wild west and peak of excitement for all devices. Everyone was hanging on the words of Netflix and other streaming platforms. Giraffic was one of the only providers of adaptive video acceleration technology at the time that helped reduce buffering and improve streaming quality for […]

Servicing Cyber Through Service Providers

Situation: Most consumers don’t want to think about cybersecurity for their homes and devices. That’s why Allot decided to bring their cyber solution (and network acceleration platform) to consumers through service providers. The idea is to make cyber another line item on consumer telecom bills where, for micro-incremental costs, consumers can have full security without […]