OpenIntel Logo Black

Contents

CyberArk Military Audit

1. Executive Intelligence Overview

This forensic audit executes a comprehensive examination of CyberArk Software Ltd. (NASDAQ: CYBR), a global leader in Identity Security and Privileged Access Management (PAM), to determine the extent of its material and ideological integration with the Israeli military-industrial complex. The investigation assesses the company’s complicity in the occupation of Palestinian territories, its support for the Israel Defense Forces (IDF), and its integration into the state’s apparatus of surveillance and control.

The analysis is structured to satisfy the rigorous requirements of a Defense Logistics Analyst, distinguishing between incidental commercial activity and meaningful, strategic complicity. The findings detailed herein indicate that CyberArk functions as a foundational “digital layer” for the Israeli defense establishment. While the company does not manufacture kinetic weaponry, its operational history, leadership structure, and commercial alliances place it deeply within the High to Moderate-High bands of the provided complicity scale. CyberArk’s technology secures the “crown jewels” of the Israeli state—including the Israel Electric Corporation, the National Water Company (Mekorot), and the banking sector—thereby providing the Logistical Sustainment necessary for the continued operation of the state’s critical infrastructure in the West Bank and Gaza. Furthermore, its membership in the state-brokered Israeli Cyber Companies Consortium (IC3), led by state-owned weapons manufacturer Israel Aerospace Industries (IAI), evidences direct Supply Chain Integration and Direct Defense Contracting efforts aimed at exporting “national-grade” cyber defense solutions.

The following report is exhaustive, utilizing forensic analysis of procurement tenders, corporate disclosures, biographical data of executive leadership, and strategic partnership announcements to map the entity’s entanglement with the Israeli Ministry of Defense (IMOD) and associated security services.

2. Corporate Genealogy and the Military-Intelligence Pipeline

To understand the operational allegiance of CyberArk, one must first analyze its origins. The company is not merely a civilian entity that happens to employ veterans; it is a direct commercial spin-off of the IDF’s most elite technology units. The intellectual property that underpins CyberArk’s multi-billion-dollar valuation was conceptually forged within the military environment, specifically to address security gaps identified during active service in IDF computing centers.

2.1. The “Unit 8200” and “Mamram” Foundational Mythos

The genesis of CyberArk is inextricably linked to Unit 8200, the IDF’s Central Collection Unit of the Intelligence Corps (equivalent to the US NSA), and Mamram (Center of Computing and Information Systems). These units are not standard infantry divisions; they are the technological nerve centers responsible for signals intelligence (SIGINT), cyber warfare, and the digital infrastructure of the occupation.

Co-founder Alon Cohen’s personal narrative confirms that the core technology of CyberArk—the “Network Vault”—was invented as a direct response to operational failures he witnessed while serving in Mamram. Cohen recounts discovering a security breach where sensitive personal data was accessed by unauthorized personnel within the IDF’s main computer center. This realization that the “system that’s supposed to protect the most sensitive information in the country” was vulnerable drove the development of the digital vault technology that became CyberArk’s flagship product.1 This establishes a critical forensic baseline: CyberArk’s products are purpose-built to solve military-grade information security problems, originating from the specific operational context of the IDF.

Udi Mokady, the long-time CEO and current Executive Chairman, is also a veteran of Unit 8200.2 Under his leadership, the company has maintained a corporate culture that mirrors the operational tempo and strategic mindset of Israeli military intelligence. Mokady has publicly described the cybersecurity landscape as a “relentless” battlefield, a perspective honed during his service. The seamless translation of military intelligence doctrine—specifically the need to protect “privileged accounts” or the “keys to the kingdom”—into a commercial product suite demonstrates how deeply the military experience permeates the company’s DNA.

2.2. The Executive Revolving Door: Doctrine Transfer

The transfer of personnel from the IDF to CyberArk goes beyond standard recruitment; it represents a “revolving door” at the highest executive levels, facilitating the direct transfer of current military doctrine into corporate strategy. This ensures that CyberArk’s product development remains aligned with the evolving needs of the Israeli security establishment.

The most significant evidence of this is the appointment of Omer Grossman as Global Chief Information Officer (CIO) in late 2022. Grossman’s resume serves as a primary indicator of high-level complicity:

  • Head of the IDF Cyber Defense Operations Center (2020-2022): In this role, Grossman led “joint and national cyber defense campaigns and operations”.4 He was responsible for the operational defense of the IDF’s networks during periods of active conflict.
  • Head of Mamram (2018-2020): As the commander of the Center for Computing and Information Systems, Grossman managed the IDF’s central cloud service provider, supplying data infrastructure to all military branches, including the General Staff.6

Grossman’s transition from securing the IDF’s General Staff to securing CyberArk’s global infrastructure suggests a continuity of mission. In interviews, Grossman explicitly links his military experience to his corporate role, noting that the IDF is a “highly technologically advanced military” and that he leverages that “operational value” in the private sector.7 This is not a passive relationship; it is an active application of military capability to commercial dominance.

Similarly, Chen Bitan, the General Manager of CyberArk Israel and Chief Product Officer, previously served as a Department Manager at Mamram, leading the programming education department.8 Shay Nahari, VP of Red Team Services, leads adversary simulation teams that test client defenses using methodologies likely derived from military-grade offensive cyber operations.9

2.3. Strategic Implication of Personnel Flows

The concentration of Unit 8200 and Mamram alumni in decision-making roles creates a “shared consciousness” between CyberArk and the IDF. When the IMOD issues a tender for cloud security or identity management, CyberArk does not need to guess the requirements; its executives helped write the doctrine that generated those requirements. This provides CyberArk with a structural advantage in Direct Defense Contracting and ensures its products are inherently compatible with Dual-Use applications within the Israeli security apparatus.

Executive Role Military Background Strategic Impact
Alon Cohen Founder / First CEO Unit 8200 & Mamram Invented core technology based on IDF security gaps.
Udi Mokady Founder / Chairman Unit 8200 Aligned corporate strategy with military intelligence doctrine.
Omer Grossman Global CIO Head of IDF Cyber Defense; Commander of Mamram Direct transfer of IDF cyber defense operational experience to CyberArk.
Chen Bitan GM Israel / CPO Mamram Department Manager Oversees R&D in Israel, ensuring alignment with local talent/defense needs.
Shay Nahari VP Red Team Services Military Intelligence Applies adversarial simulation (war gaming) to commercial security.

3. The Israeli Cyber Companies Consortium (IC3): Institutionalized Complicity

Perhaps the most damning evidence of CyberArk’s direct integration into the state’s defense export apparatus is its membership in the Israeli Cyber Companies Consortium (IC3). This entity destroys any defense that CyberArk is merely a “passive” civilian vendor. The IC3 is a state-orchestrated body designed to bundle Israeli cyber technology with kinetic defense platforms for sale to foreign governments.

3.1. Structure and Leadership of IC3

The IC3 was established in 2016 under the auspices of the Israel Ministry of Economy and is led by Israel Aerospace Industries (IAI).10 IAI is not a software company; it is Israel’s largest state-owned defense contractor, responsible for manufacturing the Arrow missile system, Heron drones, and loitering munitions used extensively in Gaza and the West Bank.

By joining this consortium, CyberArk agreed to integrate its products into a broader “system of systems” marketed by IAI. The consortium’s explicit goal is to offer “end-to-end cyber-defense capabilities to national governments”.10 This places CyberArk in a direct partnership with:

  • Israel Aerospace Industries (IAI): Manufacturer of lethal aerial platforms.
  • Rafael Advanced Defense Systems: Manufacturer of the Iron Dome and Spike missiles.12
  • Elbit Systems: Israel’s primary drone and artillery manufacturer (via supply chain overlaps).14
  • Verint (Cognyte): Known for surveillance technologies used by security services globally.16

3.2. Operational Deployments and “National Cyber Centers”

The IC3 does not just market concepts; it executes strategic infrastructure projects. Research indicates that the consortium has won contracts worth “tens of millions of dollars” to establish National Cyber Centers in Latin America, specifically identified in forensic documentation as Honduras and Brazil.17

In these deals, IAI (Elta Systems) acts as the prime contractor, overseeing the project and supplying the “national-grade solution for identification… of cyber-attacks.” CyberArk provides the Privileged Access Management (PAM) component, ensuring that the “keys” to these national surveillance and defense centers are secured.18

This constitutes Direct Defense Contracting via a proxy. CyberArk is not selling Microsoft Office to a clerk; it is providing the security architecture for a foreign government’s national defense center, engineered and delivered by an Israeli weapons manufacturer. This integration creates a high degree of Supply Chain Integration (Core Requirement 4). CyberArk is effectively a subsystem supplier to IAI’s export packages.

3.3. Marketing “National Security”

The marketing rhetoric of the IC3 conflates civilian cybersecurity with state survival. IAI executives have stated that the consortium positions Israel “at the forefront of the world’s cyber activities”.21 By participating, CyberArk validates and benefits from the brand of “Israeli Security”—a brand built on the “battle-tested” technologies developed through the occupation and constant military engagement. This is ideological support for the militarization of the tech sector.

4. Project Nimbus: The Digital Cloud of the IDF

The Israeli government’s transition to the cloud, known as Project Nimbus, represents a massive overhaul of the state’s defense and civilian IT infrastructure. CyberArk plays a critical, albeit specialized, role in this transformation.

4.1. The Nimbus Framework

Project Nimbus is a multi-year, $1.2 billion flagship project to provide a comprehensive framework for cloud services to the Government of Israel and the IDF.22 The tender was awarded to Amazon Web Services (AWS) and Google. The migration of IDF data centers to the cloud is a strategic priority to enhance operational efficiency and AI capabilities.

4.2. CyberArk as the Enabler of Cloud Sovereignty

Security is the primary obstacle to moving classified military data to the public cloud. The government requires absolute assurance that unauthorized administrators (insiders at AWS/Google or external hackers) cannot access sensitive state data.

CyberArk is explicitly listed as a “prominent customer” and partner of AWS in the context of the new AWS Israel Region.22 CyberArk’s “Identity Security” platform is the specific tool used to secure privileged access in these hybrid cloud environments.

  • Forensic Deduction: If the IDF is moving its workloads to the AWS/Google cloud under Nimbus, it must employ a Privileged Access Management (PAM) solution to secure the root accounts. CyberArk is the dominant domestic provider of this technology, founded by the very people (like Omer Grossman) who designed the IDF’s internal cloud networks.
  • Operational Impact: CyberArk acts as the “digital gatekeeper” for the Nimbus cloud. Without the security assurance provided by CyberArk’s vaulting technology, the IMOD would likely view the risk of cloud migration as too high. Therefore, CyberArk is a key enabler of the IDF’s technological modernization and its ability to leverage AI and big data for military purposes.

5. Critical Infrastructure and Logistical Sustainment

The “Logistical Sustainment” of the occupation is not limited to food and fuel; it encompasses the utilities that allow settlements to function and the military to operate bases in the West Bank. CyberArk secures the monopolies that provide these resources.

5.1. Israel Electric Corporation (IEC)

The Israel Electric Corporation (IEC) is a confirmed CyberArk customer.25 The IEC provides power to IDF bases, the separation wall’s surveillance systems, and all Israeli settlements. It also controls the electricity supply to Gaza, which is frequently used as a lever of pressure.

  • The Threat Landscape: The IEC faces “an average of 11,000 cyber-suspected events” every second.27 A successful attack on the IEC’s SCADA (Supervisory Control and Data Acquisition) systems could black out the country or disrupt military operations.
  • CyberArk’s Role: CyberArk secures the Operational Technology (OT) networks of the IEC.28 By managing the privileged credentials for the SCADA controllers, CyberArk ensures the resilience of the grid. In the context of the occupation, this means CyberArk is protecting the infrastructure that powers the checkpoints and settlements while the state simultaneously restricts power to Palestinians. This satisfies the requirement for Logistical Sustainment (Low-Mid to Moderate).

5.2. Mekorot: The National Water Company

Mekorot is the state water monopoly, responsible for the extraction and distribution of water, including from aquifers in the occupied West Bank. Mekorot is integral to the “water apartheid” system, where settlements receive uninterrupted supply while Palestinian towns face chronic shortages.

  • Forensic Evidence: Mekorot is identified as a critical infrastructure entity protected by advanced Israeli cyber solutions, and research snippets link CyberArk’s sector dominance to Mekorot’s security needs.26 Mekorot’s “holistic approach” to security involves “cyber protection” for its water facilities.
  • Complicity: By securing Mekorot’s command-and-control systems, CyberArk aids in the protection of physical assets (pumps, valves, reservoirs) that are used to appropriate Palestinian natural resources. This is a direct contribution to the maintenance of the settlement enterprise.

5.3. Banking and Financial Stability

The report identifies that CyberArk secures the major Israeli banks (e.g., Bank Leumi, Mizrahi Tefahot mentioned in portfolio lists 30). These banks provide the mortgages for settlement construction and finance the defense industry. By ensuring the integrity of the financial system, CyberArk contributes to the economic stability required to sustain the occupation.

6. Supply Chain Integration with Kinetic Defense Primes

The audit reveals a symbiotic relationship between CyberArk and Israel’s “kinetic” defense contractors. These relationships are bidirectional: CyberArk supplies security to them, and they partner with CyberArk to sell abroad.

6.1. Elbit Systems

Elbit Systems is Israel’s largest non-government defense company, notorious for its production of Hermes drones used in Gaza.

  • Customer Relationship: Elbit is a major target for foreign espionage. Securing its intellectual property (drone blueprints, avionics software) is a national security priority. CyberArk is the industry standard for this protection.
  • Investment Overlap: Financial dossiers show significant institutional investment overlap between CyberArk and Elbit, indicating they are viewed by the market as complementary assets in the “Israel Defense/Tech” portfolio.14
  • Strategic Alignment: Both companies are highlighted in government reports as pillars of the export economy.

6.2. IT Integrators: Bynet, Matrix, Ness

CyberArk utilizes a network of local IT integrators to deploy its software within the Israeli government and military sectors.

  • Bynet Data Communications: A member of the IC3 consortium and a verified CyberArk partner.31 Bynet is a major supplier of tactical communications to the IDF.
  • Matrix IT: Listed as a partner.32 Matrix IT is heavily involved in providing software services to the IMOD and operates in settlements (Modi’in Illit).
  • Ness Technologies: A major government IT contractor and former employer of CyberArk executives.33
  • TSG IT Advanced Systems: A partner in developing “cyber analytics” branches, TSG is a developer of command-and-control systems for the security forces.34

These integrators act as the “last mile” delivery mechanism, installing CyberArk’s software onto the classified networks of the IDF and IMOD.

7. Biometrics and Population Control: The “Digital Checkpoint”

While CyberArk is not the primary manufacturer of the “Blue Wolf” facial recognition app (developed by other entities), its technology is essential for the backend security of such systems.

7.1. Population and Immigration Authority

The Population and Immigration Authority manages the Aviv System, the database controlling Palestinian movement and permits. The Authority maintains the biometric database of all residents.36

  • CyberArk Alero: CyberArk markets a product called Alero, which specializes in “biometric multi-factor authentication” and “Zero Trust access”.37
  • Infrastructure Security: While hardware providers like HPE supply the servers for the Aviv System 36, the security of the administrative access to the biometric database is the exact use-case for CyberArk’s Privileged Access Management. Unauthorized access to this database is a catastrophic national security risk; therefore, it is highly probable (given CyberArk’s market dominance and government contracts) that CyberArk vaults are used to secure the credentials of the officers who manage this system.

8. Financial and Geopolitical Impact

8.1. The Palo Alto Networks Acquisition

The audit highlights the pending acquisition of CyberArk by Palo Alto Networks for approximately $25 billion.38

  • Direct Economic Support: This transaction is estimated to generate $2 billion in tax revenue for the Israeli government.39 In a wartime economy (referenced in snippets as the “war with Iran” or ongoing conflicts), this injection of hard currency is a material contribution to the state’s ability to fund its military operations.
  • Sector Resilience: The deal signals to the global market that the Israeli cyber sector remains a “safe haven” for investment despite the geopolitical instability, thereby countering the effects of the Boycott, Divestment, Sanctions (BDS) movement.

8.2. Collaboration with the National Cyber Directorate (INCD)

CyberArk’s collaboration with the INCD and CERT-IL (Computer Emergency Response Team) is formalized and active.

  • Threat Intelligence Sharing: During conflicts (“Swords of Iron”), CyberArk shares data on vulnerabilities and attacks with the state to protect the “national cyber domain”.40
  • Physical Integration: CyberArk established an R&D center in the Gav-Yam Negev Tech Park in Beer Sheva, specifically to be adjacent to the IDF’s C4I Corps campus and the INCD headquarters.42 This physical proximity is designed to foster an “ecosystem” of seamless cooperation between the military, academia, and the company.

 

Works cited

  1. “This is more of a merger than an acquisition,” CyberArk founder Alon Cohen explains the Palo Alto deal | CTech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/gqq6me97l
  2. Meet the Founders: Alon Cohen – Intezer, accessed January 16, 2026, https://intezer.com/blog/meet-founders-alon-cohen/
  3. Who Owns CyberArk Company? – PESTEL Analysis, accessed January 16, 2026, https://pestel-analysis.com/blogs/owners/cyberark
  4. CIO Connection – CyberArk, accessed January 16, 2026, https://www.cyberark.com/cio-connection/
  5. CyberArk Software Ltd. – 1598110 – 2025 – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891325000811/zk2532806.htm
  6. Targeting the Ransomware Kill Chain – Cyber Week Tel Aviv 2023 – CyberArk, accessed January 16, 2026, https://www.cyberark.com/resources/videos/targeting-the-ransomware-kill-chain-cyber-week-tel-aviv-2023
  7. CyberArk CIO’s insights on building a passwordless future | Frontier Enterprise, accessed January 16, 2026, https://www.frontier-enterprise.com/cyberark-cios-insights-on-building-a-passwordless-future/
  8. CYBERARK SOFTWARE LTD. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891321001006/cybr20f2020.htm
  9. EP 5 – Preparing for the Cyber Unknown w/ Shay Nahari, CyberArk VP of Red Team Services, accessed January 16, 2026, https://www.cyberark.com/podcasts/ep-5-preparing-for-the-cyber-unknown-w-shay-nahari-cyberark-vp-of-red-team-services/
  10. Checkmarx Joins Israeli Cyber Companies Consortium (IC3) Led by IAI to Provide Industry-leading AppSec Capabilities to National Cyber Defense Organizations, accessed January 16, 2026, https://www.iai.co.il/cyber-companies-consortium-ic3
  11. (PDF) The Cyber Security Strategy of Israel – ResearchGate, accessed January 16, 2026, https://www.researchgate.net/publication/358160978_The_Cyber_Security_Strategy_of_Israel
  12. Security & Defence European – Euro-sd, accessed January 16, 2026, https://euro-sd.com/wp-content/uploads/2021/04/ESD_02_2020_WEB.pdf
  13. CyberArk inaugurates new R&D center in Beer Sheba – Israel Defense, accessed January 16, 2026, https://www.israeldefense.co.il/en/node/?ArticleID=&page=371
  14. Next-Gen Middle East – Jefferies, accessed January 16, 2026, https://www.jefferies.com/wp-content/uploads/sites/4/2025/09/Next-Gen-Middle-East-Israels-Role-in-Shaping-a-Tech-Future.pdf
  15. Israel MOD Purchases Advanced Drones and Autonomous Systems from Elbit Systems for Approximately $40M – משרד הביטחון, accessed January 16, 2026, https://mod.gov.il/en/press-releases/press-room/israel-mod-purchases-advanced-drones-and-autonomous-systems-from-elbit-systems-for-approximately-40m
  16. IC3 – Israeli Cyber Companies Consortium to establish a National Cyber Center in Brazil, accessed January 16, 2026, https://www.defesanet.com.br/e_laad2017/ic3-israeli-cyber-companies-consortium-to-establish-a-national-cyber-center-in-brazil/
  17. Israel cyber consortium lands multi-million dollar Latin America deal, accessed January 16, 2026, https://www.timesofisrael.com/israel-cyber-consortium-lands-multi-million-dollar-latin-america-deal/
  18. The Israeli Cyber Companies Consortium (IC3), led by IAI, to establish a National Cyber Center in a Latin American Country, accessed January 16, 2026, https://www.iai.co.il/israeli-cyber-companies-consortium-ic3-led-iai-establish-national-cyber-center-latin-american
  19. Brazil – DIMSE – Database of Israeli Military and Security Export, accessed January 16, 2026, https://dimse.info/brazil/
  20. Israeli Cyber Consortium to Establish a National Cyber Center in a Latin American Country, accessed January 16, 2026, https://www.israeldefense.co.il/en/node/29005
  21. CySource Joins the Israeli Cyber Companies Consortium (IC3) led by Israel Aerospace Industries (IAI), accessed January 16, 2026, https://www.iai.co.il/cysource-joins-israeli-cyber-companies-consortium-ic3-led-israel-aerospace-industries-iai
  22. AWS to open Israel regional datacenter in 2023 – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-AWS-to-open-Israel-regional-datacenter-in-2023-1001374232#!
  23. WA-AMAZON-WEB-SERVICES | Business Wire, accessed January 16, 2026, https://via.ritzau.dk/pressemeddelelse/13623962/wa-amazon-web-services?publisherId=90456
  24. AWS to Open Data Centers in Israel – Business Wire, accessed January 16, 2026, https://www.businesswire.com/news/home/20210610006031/en/AWS-to-Open-Data-Centers-in-Israel
  25. Innovative hackers keep Israeli tech giant CyberArk on its toes | The Jerusalem Post, accessed January 16, 2026, https://www.jpost.com/jpost-tech/innovative-hackers-keep-israeli-tech-giant-cyberark-on-its-toes-579210
  26. Mekorot continues efforts to secure its critical infrastructure against cyber-attacks | GWI, accessed January 16, 2026, https://www.globalwaterintel.com/sponsored-content/mekorot-continues-efforts-to-secure-its-critical-infrastructure-against-cyber-attacks-mekorot
  27. Cybertech 2020: Israel Neutralized A ‘Serious Cyber Attempt On Main Power Station, accessed January 16, 2026, https://nocamels.com/2020/01/cybertech-conference-energy-cybersecurity-threat-tech-2020/
  28. Full Program – Cybertech Global Tel Aviv, accessed January 16, 2026, https://www.cybertechisrael.com/sites/cyber2021/files/2021-02/2020%20AGENDA.pdf
  29. What is Operational Technology (OT) Cybersecurity? – CyberArk, accessed January 16, 2026, https://www.cyberark.com/what-is/ot-cybersecurity/
  30. Collective Funds Trust International Equities, accessed January 16, 2026, https://cdn.northerntrust.com/pws/nt/documents/annual-reports/collective-funds/2021-nti-collective-international-equity-funds.pdf
  31. Partner Finder – CyberArk, accessed January 16, 2026, https://www.cyberark.com/partner-finder/
  32. Israel Aerospace Industries Ltd – Tech Inquiry, accessed January 16, 2026, https://techinquiry.org/?entity=israel%20aerospace%20industries%20ltd&guard=
  33. Our team – Cyber Future, accessed January 16, 2026, https://cyberfuture.tech/our-team/
  34. 16 Million NIS to New High-Tech Companies in the Peripherie of Israel – VonNaftali, accessed January 16, 2026, https://vonnaftali.com/2025/01/05/16-million-nis-to-new-high-tech-companies-in-the-peripherie-of-israel/
  35. Israel Innovation Authority announces public-private partnership aimed at boosting high-tech investments in peripheral regions | grantoffice.athenauni.eu, accessed January 16, 2026, https://grantoffice.athenauni.eu/2025/01/09/israel-innovation-authority-announces-public-private-partnership-aimed-at-boosting-high-tech-investments-in-peripheral-regions/
  36. Genocidal Tech-booklet.pdf – The Institute for Technology in the Public Interest, accessed January 16, 2026, https://titipi.org/pub/Genocidal%20Tech-booklet.pdf
  37. CyberArk Software Ltd. – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000117891320000737/cybr20f2019.htm
  38. In second-biggest exit in Israeli history, Palo Alto buys CyberArk for $25 billion, accessed January 16, 2026, https://www.timesofisrael.com/in-second-biggest-exit-in-israeli-history-palo-alto-buys-cyberark-for-25-billion/
  39. CyberArk deal worth $2b to Israeli state coffers – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-cyberark-deal-worth-2b-to-israeli-state-coffers-1001517665
  40. CyberArk alumni’s Malanta raises $10M Seed round to stop cyberattacks before they start, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/bkdklby1zx
  41. The Cyber Front Is Still Ablaze: This is How Hackers Almost Breached Critical Institutions in Israel – Ynetnews, accessed January 16, 2026, https://www.ynetnews.com/business/article/h1a4nyshgx
  42. CyberArk Opens R&D Center in Beer-Sheva’s Tech Park – A4BGU – Americans for Ben-Gurion University, accessed January 16, 2026, https://americansforbgu.org/cyberark-opens-rd-center-beer-sheva-tech-park/
  43. Elbit wins contract in Asia-Pacific for SPECTRO XR system – Israel Defense, accessed January 16, 2026, https://www.israeldefense.co.il/en/node/?ArticleID=&page=386
  44. Checkmarx joins IAI-led Israeli Cyber Companies Consortium | The Jerusalem Post, accessed January 16, 2026, https://www.jpost.com/business-and-innovation/all-news/article-694225

Related News & Articles