Cybersecurity Expert Bryan Seely Lands at Cyemptive to Expand Computer Security

essidsolutions

Celebrated ethical hacker Bryan Seely will build and oversee network and computer security for Cyemptive’s business and government customers.

One of the leading cybersecurityOpens a new window products and technology providers Cyemptive Technologies, announced hiring Opens a new window renowned ethical hacker and cybersecurity expert Bryan Seely as Senior Security Architect to beef up the company’s cyber defense strategy. Seely will focus on building network and computer security for Cyemptive’s customers and work closely with Cyemptive’s patented technology that monitors the state of files rather than the APIs.

Tech News: Behavioural Science Backs Motimatic’s New Anti-Phishing Cybersecurity SolutionOpens a new window

Coming from a diverse but expert background, Seely is pegged as an excellent pick by the company. He was the first person who successfully wiretapped the United States Secret Service and FBI. Talking about Seely’s appointment, Rob Pike, CEO of Cyemptive Technologies, saidOpens a new window , “We’re pleased to have another person of Bryan’s caliber join the Cyemptive organization. His unique blend of experience and knowledge of cyberthreats, particularly of hacker behavior and mindset, will be of great benefit in helping clients protect their organizations from cyberattacks.”

Tech News: Billy Spears Joins Alteryx as Chief Information Security Officer (CISO)Opens a new window

Why Seely Joined Cyemptive Technologies?

According to Seely, “Cyemptive’s approach is such a game changer that all my previous hacks would not stand a chance against this technology. It is far superior to any Artificial Intelligence (AI) technology I have seen and will rapidly replace AI-based solutions in the market today as the company continues to scale. It is amazing to finally see a cyber defense technology that actually works and very exciting to be part of it.”

Cyemptive’s Security Technology

Cyemptive Technologies have a patented monitoring system that analyzes the actual files and not the APIs of a file. This enables the company product to stop the cyber threat at the start by identifying and eliminating cyber threats in the file itself before the problem initiates.

Let us know if you liked this article on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!