Extensive billboard campaign this week

by time news

In general, Cyber ​​Week is held every year under the leadership of the Belvatnik Cyber ​​Center and the National Cyber ​​Array and brings together cyber experts and leading researchers from Israel and around the world, along with policymakers and international and international security officials, diplomats and heads of international corporations. Shiri Glazer, VP of Global Marketing at Cider Security: “This is a week full of Israeli and global cyber celebrations. We launched the campaign to create a meeting between Cider and cyber experts and expose them to the leading solution in the worlds. “Thanks to the move, we have taken another step in positioning the company as a leader in the global cyber industry. We are pleased to see that the campaign has achieved its goal and created a very positive response among those exposed and especially among the company’s employees.”

More in-

Cider Security was founded at the end of 2020 by Guy Fletcher (former information security manager at AppsFlyer) and Daniel Kribelevich, who have extensive experience in various positions in information security teams and cyber consulting companies, in order to address one of the complex challenges that information security organizations and entities Development are dealing with them today. The platform they have developed provides security teams using the product with an in-depth picture and a comprehensive view of the technologies, systems and processes that exist in the organization’s development environment. This capability enables security teams to implement controls and solutions tailored to the unique technological characteristics of each environment, in order to improve security and achieve full resilience throughout the CI / CD (Continuous Integration Continuous Delivery) process – from code construction to deployment. The code is sent to the production environment.

More in-

The technology built by Cider is unique in its ability to enable organizations of all sizes and levels of maturity to implement and manage full application security plans within minutes, and in fact allow full democratization in information security processes, without the need to slow down development processes.

You may also like

Leave a Comment