Laptop cyber

In cyber warfare, like in chess, the game outcome is not determined by a single exploit (or move), but rather by a patient silent-predator strategy.

 The same can be said of hackers sniffing a corporation’s many interfaces until they have an “in”.

When a hacker further exploits the corporation without detection – till it’s “checkmate” and Doomsday arrives. Suddenly the company makes headlines with its data leaks and everyone gets busy with damage control and corporate reputation PR, millions in equity and funds are lost, and sadly, a few executives lose their jobs as well.

I learned how to think like a hacker from my uncle, Vladimir Liberzon.

Chess Grandmasters
Vladimir Liberzon, 1937-1996, was my uncle. 

Vladimir was a Russian and Israeli chess grandmaster. At his prime, he was a chess force to be reckoned with, practicing disciplined moves and strategies that made their way into chess textbooks. His skill made him one of the most consistent performers of his time in Russia, Europe and Israel.

What I absorbed in my youth from “Uncle Vladimir”, as we called him, I took not only to the chessboard hobby but also to life and my greatest passion — Cyber Warfare. It is amazing to see the parallel lines we can draw between these two mind-battlefields. I saw that by anticipating the opponent’s moves, multiple steps ahead, I could be on both the defense and offense to protect my pieces and wipe out all of his, to win the game.

With this insight I founded Pcysys. My objective was to give every CSO his own “grandmaster” of cyber in the form of intelligent penetration testing software. The ability to perform machine-based pen testing, that continuously thinks and acts as hackers do, is the best way to make sure that corporations have their cyber defense line as tight and strong as it can be. Defense lines must adapt to threats at the same pace as hacking techniques advance.

The fact is that today more than 95% of cyber technology expense is invested in defense technology, which does not have the ability to evolve and align that defense with a hacker’s perspective in mind, one that takes into account multi-step attack “vectors” or “kill chains” rather than just desperate vulnerabilities.

Whether we like it or not, it’s a two sided game that we’re managing day in and day out thinking a few steps ahead. Software and AI are the key to giving corporations the upper hand.

For those who want the full story of this grandmaster, read more about him here: Wiki

And if you can see how your corporation could use a grandmaster to protect against cyber warfare, please drop me a note to arik@pcysys.com.


Arik Liberzon, led an elite cyber warfare group at the Israeli Defense Force’s computer service directorate. His group was responsible for penetration testing strategic asset networks and national mission-critical systems. Following a decade of mastering the penetration testing profession, Liberzon applied his mastership of ethical hacking in software and together with serial IT entrepreneur Arik Feingold, founded Pcysys in 2015.

Liberzon holds a B.Sc in Aerospace Engineering from the Technion Institute of Technology, a Masters Degree in Finance from Ben-Gurion University and an MBA from Tel Aviv University.

Written by: Arik Liberzon
Show all articles by Arik Liberzon
Learn more about automated security validation
Resource center
Get blog updates via email
Trending
Four steps the financial industry can take to cope with their growing attack surface
Four steps the financial industry can take to cope with their growing attack surface

The financial services industry has always been at the forefront of technology adoption, but the 2020 pandemic accelerated the widespread use of mobile banking apps, chat-based customer service, and other digital tools. Adobe’s 2022 FIS Trends Report, for instance, found that more than half of financial services and insurance firms surveyed experienced a notable increase […]

The elephant 🐘 in the cloud
The elephant 🐘 in the cloud

As much as we love the cloud, we fear it as well. We love it because cloud computing services of Amazon, Azure, and Google have transformed operational efficiency and costs, saving us money, time, and alleviating much of the IT burden. We also fear it because as companies moved to the cloud, they found that […]

A new era of tested Cloud Security is here
A new era of tested Cloud Security is here

Cloud computing has fundamentally changed how we operate. It’s efficient and scalable, but it’s not without some problems. Security is the biggest. As we’ve shifted to the cloud, we’ve exposed ourselves to new risks that can’t be ignored. The IBM Cost of a Data Breach 2023 Report points out that 11% of breaches are due […]

Learn more about our platform
Platform