Company Logo



February Monthly Edition 2023

Resecurity — next-generation cybersecurity platform designed to detect and mitigate tomorrow’s threats today

Resecurity — next-generation cybersecurity platform designed to detect and mitigate tomorrow’s threats today

Cybersecurity has become a necessity for businesses of all sizes as their systems and networks containing valuable and sensitive data, have come under siege by malicious actors. It is designed to protect all categories of data from theft and damage.

Without a cyber security strategy, your business cannot defend itself from cyber threats leaving it vulnerable to malicious actors, who will identify your business as an easy target. Along with the way technology has evolved over the years, there has been a steady increase in inherent and residual threats.

Businesses can no longer rely on simple solutions like their anti-virus or firewall to protect themselves from the impending threat of cyber criminals, who are becoming smarter and capable of evading these simple defenses. Businesses have adopted more convenient methods of carrying out their operations, for instance, data can now be stored on the cloud, i.e., many businesses use cloud services like Microsoft Azure, to store their valuable data.

Although convenient, businesses rarely secure their information satisfyingly while using these cloud services, paired with an increase in attacker sophistication, this has led to a heightened level of risk that your business may succumb to a successful cyber-attack or data breach.

If your organization is feeling the necessity of upgrading its cyber defenses and you are unsure about the market offering, then Resecurity will be your best choice. Resecurity delivers a unified platform for endpoint protection, risk management, and threat intelligence for large enterprises and government agencies worldwide.

Resecurity is focused on intelligence-driven solutions. The company invests in big data, artificial intelligence, and data science. These bring unique value in complex investigations of cybercrimes, apt campaigns, and threat actors.

Recently, CIO Bulletin exclusively spoke to Gene Yoo, the CEO of Resecurity, about the importance of cybersecurity, the growth of Resecurity, and the growth of the organization. The following excerpts were taken from the conversation that ensued

Q. Amidst a myriad of companies already providing cybersecurity services in the market, why was Resecurity founded? What does Resecurity do that other cybersecurity companies are not?

When we started Resecurity, it was never our intention to disrupt the market or introduce yet another solution in the marketplace. We spent roughly 3 years developing and prototyping our solution to address end-to-end ecosystem protection using all-source intelligence. We wanted to provide a “solution” that can solve not one but many cyber security challenges. Our goal was simple, build big data that can be portable for us to build a product on top of it, because without data and I mean fresh data you can’t do AI/ML or understand how to build a solution.

Resecurity is not a point solution and what we do is solve business and technical challenges with data. We are a data company first before anything else. Our solutions just provide visualization of our big data but even beyond that, we focus on many parts of criminal activities. Cybercrime is a small set of global problems. Just like ransomware and security events, this is just a small set of the bigger problem.

Q. Can you briefly explain Resecurity’s mission statement?

When we wrote this “Our mission is to enable enterprises, national security and law enforcement agencies to combat cyber threats regardless of how sophisticated they are”, we wanted to extend and reach where others have stopped. We wanted to be an extension or even be peripheral to what can be done to combat crime. This isn’t about technology or signal or all these marketing terms, it’s about identifying actual pieces of intelligence and making them actionable. Or be the action itself.

Q. How has Resecurity grown over the years since its inception? What are some of its most significant contributions to combat the rising global threat of cybercriminals?

I can honestly say that we have grown organically. I know this is used so loosely but our growth has been through word of mouth and always doing the right thing for our clients, meaning delivering quality work. Believe it or not, when you look at the overall utilization of the organization, we spent around 33% of our time working with domestic and international agencies on combating crime. And the reality is that most of this work is done at no cost. Because sometimes you do what is necessary to protect national security. And ultimately, if you’re not putting someone in handcuffs, what is the point of all this?

Q. How does Resecurity reimagine cybersecurity for both, individuals and enterprises?

Re” can be anything from a reboot, redo, revolutionize, revolt, and many others. We wanted to democratize security and provide solutions for all using the same all-source intelligence. Plain and simple. Not some identity protection but using the same data, same technology, same AI/ML that we use for the military to be used for all. Going back to build everything from data and service all.

Q. How does Resecurity employ Artificial Intelligence, Big data, and data science to tackle modern-day cybersecurity threats?

All the marketing hype of AI, Big Data, ML, etc. in solution doesn’t mean anything nor does it tackle the modern threats. Because these terms are about a process for generalizing from examples (e.g., regression, classification, forecasting, clustering, anomaly detection, etc…) and having a fresh set of examples is key. Without it, it’s just marketing buzz and doesn’t do much more. We process on average over 38,000 points of interest in 24 hours that are extracted, transformed, and loaded onto our platform for our client to pivot. Or a simple, actual piece of intelligence relevant to our client. This is just 40% of what we deliver through our platform. Rest is all supported by our Hunter™ Unit. Unfortunately, intelligence is more than technology automation, true power comes from decision support and human operations.

Q. Can you give a few examples of how the company has solved its customers’ cybersecurity issues?

Think of us as above the firewall, like UAV going far beyond the reaches of your castle in understanding and identifying actual threats against you. That’s what we do. Reduce noise, and collect actual pieces of intelligence for you to act against. The key is to provide who is targeting you and how they are targeting you. This is the key answer we provide to our clients. No one cares about scores and some arbitrary number to provide some security theater, it’s already known by the industry that the walls are porous and many hygiene matters need to be done. It’s a matter of when not if. So while our clients are focused on improving hygiene, hardening, and patching, they can safely conduct these operational tasks while we are monitoring the outside for actual threats.

Q. What are the cybersecurity solutions offered by Resecurity? Can you explain in brief?

We provide both technical and business solutions. People that come to us don’t come to us and say you have a threat intelligence platform, they come to us and tell us here are the challenges, and how can we solve them. This can be anything from fraud intelligence, identity protection, financial forensics, money laundering, nation-state, brand protection, etc.

Q. Resecurity offers several cybersecurity products built specifically for enterprises, what are they and how are they different from each other?

We have our base platforms like: -

  • Context™ — threat intelligence platform
  • Risk™ — digital risk
  • EPP — endpoint solution
  • IDProtect — identity protection

Each business vertical has its own unique set of challenges, not cyber but consumer, fraud, M&A, supply chain, etc. And these problems or challenges require more than just a cyber security “platform” or “solution”. It’s done through understanding these challenges and figuring out a way to build them using data sources. We have built over two dozen customized “add-ons” to meet these challenges for our clients.

Q. What were some of the challenges Resecurity has overcome to stand in its enviable position within the global cybersecurity community?

As a company, we face the same challenges as everyone. I can make a long list but I’m thankful for everyone at Resecurity and the amazing talent that continues to work with us.

Q. What are Resecurity’s plans for the future?

Well, it’s been over 5 years of our marathon. We plan to continue our growth trajectory, expand into all regions, and provide quality work.

Paving the way forward for cybersecurity of the future

Gene Yoo is the CEO f Resecurity. He has over 30 years of experience in cybersecurity for some of the world's largest brand names such as Warner Bros., Sony, Computer Science Corporation, Coca-Cola Enterprise, Capgemini, and Symantec. Most recently, Gene served as Senior Vice President and Head of Information Security for City National Bank. He also served in an advisory role to Phantom (acquired by Splunk), Protectwise (acquired by Verizon), Elastica (acquired by Blue Coat), and Vorstack (acquired by ServiceNow).

”The next-generation platform for enterprise endpoint protection.”

“Streamline cybersecurity monitoring and response with comprehensive visibility, detection, and analysis housed on one platform.”


Business News


Recommended News



Most Featured Companies

ciobulletin-aatrix software.jpg ciobulletin-abbey research.jpg ciobulletin-anchin.jpg ciobulletin-croow.jpg ciobulletin-keystone employment group.jpg ciobulletin-opticwise.jpg ciobulletin-outstaffer.jpg ciobulletin-spotzer digital.jpg ciobulletin-virgin incentives.jpg ciobulletin-wool & water.jpg ciobulletin-archergrey.jpg ciobulletin-canon business process services.jpg ciobulletin-cellwine.jpg ciobulletin-digital commerce bank.jpg ciobulletin-epic golf club.jpg ciobulletin-frannexus.jpg ciobulletin-growth institute.jpg ciobulletin-implantica.jpg ciobulletin-kraftpal technologies.jpg ciobulletin-national retail solutions.jpg ciobulletin-pura.jpg ciobulletin-segra.jpg ciobulletin-the keith corporation.jpg ciobulletin-vivolor therapeutics inc.jpg ciobulletin-cox.jpg ciobulletin-lanner.jpg ciobulletin-neuro42.jpg ciobulletin-Susan Semmelmann Interiors.jpg ciobulletin-alpine distilling.jpg ciobulletin-association of black tax professionals.jpg ciobulletin-c2ro.jpg ciobulletin-envirotech vehicles inc.jpg ciobulletin-leafhouse financial.jpg ciobulletin-stormforge.jpg ciobulletin-tedco.jpg ciobulletin-transigma.jpg ciobulletin-retrain ai.jpg
ciobulletin-abacus semiconductor corporation.jpg ciobulletin-agape treatment center.jpg ciobulletin-cloud4wi.jpg ciobulletin-exponential ai.jpg ciobulletin-lexrock ai.jpg ciobulletin-otava.jpg ciobulletin-resecurity.jpg ciobulletin-suisse bank.jpg ciobulletin-wise digital partners.jpg ciobulletin-appranix.jpg ciobulletin-autoreimbursement.jpg ciobulletin-castle connolly.jpg ciobulletin-cgs.jpg ciobulletin-dth expeditors.jpg ciobulletin-form.jpg ciobulletin-geniova.jpg ciobulletin-hot spring it.jpg ciobulletin-kirkman.jpg ciobulletin-matrix applications.jpg ciobulletin-power hero.jpg ciobulletin-rittenhouse.jpg ciobulletin-stt logistics group.jpg ciobulletin-upstream works.jpg ciobulletin-x2engine.jpg ciobulletin-kastle.jpg ciobulletin-logix.jpg ciobulletin-preclinical safety (PCS) consultants ltd.jpg ciobulletin-xcastlabs.jpg ciobulletin-american battery solutions inc.jpg ciobulletin-book4time.jpg ciobulletin-d&l education solutions.jpg ciobulletin-good good natural sweeteners llc.jpg ciobulletin-sigmetrix.jpg ciobulletin-syncari.jpg ciobulletin-tier44 technologies.jpg ciobulletin-xaana.jpg

Latest Magazines

© 2024 CIO Bulletin Inc. All rights reserved.