logo

Contents

NordVPN Military Audit

Strategic Overview of Corporate Architecture and Jurisdictional Ambiguity

The assessment of Nord Security and its primary subsidiary, NordVPN, necessitates a granular deconstruction of its corporate layering, jurisdictional maneuvers, and the ideological provenance of its leadership. For a defense logistics analyst, the primary challenge in auditing a cybersecurity entity lies in the inherent dual-use nature of the technology and the intentional opacity maintained by the parent conglomerate to mitigate regulatory and geopolitical risks. Established in 2012 by Eimantas Sabaliauskas and Tomas Okmanas, NordVPN originated as a Lithuanian startup supported by the Tesonet business incubator.1 Over the subsequent decade, the entity evolved into a global “privacy powerhouse,” merging with Surfshark in early 2022 to form a conglomerate valued at approximately $3 billion.2

The corporate structure of Nord Security is characterized by a deliberate bifurcation between operational reality and legal jurisdiction. NordVPN officially operates under the jurisdiction of Panama, a choice strategically marketed to emphasize the absence of mandatory data retention laws.5 However, the parent holding company, Nord Security (formerly Nordsec Ltd), is incorporated in Amsterdam, the Netherlands, while its primary operational hub, known as “Cyber City,” is located in Vilnius, Lithuania.1 This tripartite arrangement — Panamanian legal protection, Dutch corporate registration, and Lithuanian technical execution — creates a complex landscape for forensic auditing, as it allows the company to claim jurisdictional immunity in various contexts while maintaining a deep physical and economic footprint in NATO and EU-aligned territories.1

Corporate Entity Role Primary Jurisdiction
Nord Security (Nordsec Ltd) Parent Holding Company Netherlands 1
NordVPN s.a. Consumer VPN Entity Panama 1
Tesonet Incubator/Accelerator Lithuania 2
Cyberspace B.V. Holding for Nord/Surfshark Netherlands 8
Surfshark VPN Subsidiary Brand Netherlands/Lithuania 9

The Vilnius headquarters, a state-of-the-art facility housed in a former Soviet-era sock factory, employs over 1,800 staff members as of 2026.2 This facility serves as the nerve center for product development across the entire suite, including NordLayer (B2B), NordPass (Password Management), and NordLocker (Encrypted Storage).11 The scale of this operation and its integration into the Lithuanian digital infrastructure — one of the most advanced in Europe — suggests that Nord Security is not merely a software provider but a critical component of the Baltic defense-adjacent technology sector.2 This regional positioning is significant, as the founders have explicitly referenced the “strengths of the Israeli tech community” as a blueprint for the Lithuanian ecosystem.13

Forensic Analysis of Direct Defense Contracting (IMOD/IDF)

A primary intelligence requirement for this audit is the identification of direct contracts between Nord Security and the Israeli Ministry of Defense (IMOD) or the Israel Defense Forces (IDF). An exhaustive review of the Israeli Defense and Homeland Defense Directory, specifically the SIBAT (International Defense Cooperation Directorate) listings, does not currently reveal “NordVPN” or “Nord Security” as a registered defense manufacturer or service provider.14 SIBAT acts as the primary bridge between the Israeli defense industry and international partners, managing G2G (Government-to-Government) and B2G (Business-to-Government) frameworks.14 The absence of Nord from these directories suggests that the company does not provide purpose-built, “mil-spec” hardware or offensive cyber capabilities directly to the Israeli state through traditional procurement channels.

However, the modern landscape of Israeli defense procurement has shifted significantly toward “agile” engagement with civilian technology startups. The Directorate of Defense Research & Development (DDR&D) has increased its contracts with security startups by 72% since the onset of intensified regional conflict in 2023.17 This shift is driven by the need for rapid solutions in cyber defense, autonomous systems, and secure communication.17 In this context, the procurement of “off-the-shelf” (OTS) cybersecurity tools like NordVPN or NordLayer often occurs through third-party resellers or via standard IT tender processes that are not captured in military-specific directories.19

The procurement mechanism for Israeli government agencies often utilizes local distributors. While NordVPN is a consumer-facing product, NordLayer is marketed as an “adaptive network access security solution” for businesses and “public administrations”.22 The presence of “physical” servers in Tel Aviv data centers implies commercial agreements with Israeli infrastructure providers, which often maintain their own relationships with the security establishment.24

Comparison of Defense Integration Markers

Complicity Indicator Nord Security Status Contextual Evidence
SIBAT Registered Contractor Not Listed Indicates lack of “prime” military status 14
IMOD/DDR&D Engagement Unconfirmed/Indirect Procurement likely through civilian IT channels 17
Tactical Software Variant Probable (NordLayer) ZTNA and Meshnet features used in high-stakes OPSEC 12
Physical Infrastructure in IL Confirmed 20+ servers in Tel Aviv; locally exploited 24

The forensic implication for defense logistics is that while Nord Security is not a “Tier 1” military contractor in the vein of Elbit Systems or Rafael, it acts as a “Tier 3” or “Tier 4” supplier of essential digital infrastructure.30 Its products secure the peripheral networks of the defense industrial base, meaning its operational complicity is tied to the sustainment of the economic and technological ecosystem that supports the occupation, rather than the direct delivery of munitions or offensive code.22

Dual-Use Capabilities and Tactical Application Analysis

The distinction between “off-the-shelf” civilian sales and “purpose-built” military supply is increasingly blurred in the cybersecurity domain. Nord Security produces several technologies that possess high tactical utility for military or paramilitary units. This “dual-use” profile is a critical element of the audit, as it demonstrates how civilian privacy tools can be repurposed for military operational security (OPSEC).

Meshnet and Decentralized Command-and-Control (C2)

One of NordVPN’s most significant tactical features is “Meshnet,” launched in June 2022.1 Meshnet allows users to create an encrypted private network by linking up to 60 devices directly, bypassing the need for a centralized VPN server.1 For military logistics and field operations, Meshnet facilitates:

  1. Peer-to-Peer Secure Communication: Enabling small units to share data and intelligence in the field without leaving a traceable signature on a public VPN node.1
  2. Virtual Routing for Remote Assets: Allowing operators to “tunnel” through a trusted device at a home base or headquarters, effectively masking their location while accessing internal military or intelligence resources.1
  3. Bypassing Local Network Restrictions: In contested urban environments where local internet service providers (ISPs) may be monitored or throttled, Meshnet provides a resilient, decentralized alternative for data exfiltration.1

NordWhisper and Obfuscation Protocols

In 2025, NordVPN introduced “NordWhisper,” a new protocol designed specifically to mimic regular web traffic and blend into the noise of a network.1 Unlike traditional VPN protocols (OpenVPN, IKEv2) which can be identified and blocked by sophisticated deep packet inspection (DPI) systems, NordWhisper aims to be “invisible” to network filters.1 This technology is essential for “tactical” operations in environments where an adversary maintains control over the network infrastructure, such as the digital occupation of the West Bank or Gaza, where Israeli security forces manage the communications backbone.34

Post-Quantum Encryption (PQE) and Strategic Intelligence

Nord Security’s move into post-quantum encryption in September 2024 reflects a direct response to nation-state threats.1 The “harvest now, decrypt later” strategy — where encrypted traffic is intercepted and stored by intelligence agencies (including the IDF’s Unit 8200) to be decrypted once quantum computing becomes viable — is a primary concern for modern defense organizations.1 By implementing PQE, Nord Security provides a high-level strategic defense that is typically the province of classified military communications systems.10

Technical Feature Tactical Utility Strategic Implication
NordLynx (WireGuard) Ultra-low latency communication Real-time surveillance data transmission 1
Meshnet P2P Encrypted Tunnels Decentralized unit communication/OPSEC 1
NordWhisper Traffic Mimicry/Obfuscation Bypassing state-level network blocks 1
Post-Quantum Enc. Long-term data protection Counter-intelligence against “Harvest Now” 1

Logistical Sustainment and Institutional Supply in the Israeli Market

The audit must determine if Nord Security provides essential services that sustain the IDF’s physical or digital presence. While there is no evidence of Nord providing physical catering, transport, or construction to IDF bases in the Negev or the West Bank, its role in “digital sustainment” is undeniable. The company maintains a consistent presence in Tel Aviv, with over 20 physical servers that facilitate high-speed, localized internet traffic.24

NordLayer, the enterprise arm, is designed to “centralize your organization’s security infrastructure”.12 It offers features such as network segmentation, identity and access management (IAM), and “device posture security”.12 In the Israeli context, where the boundary between “civilian technology” and “security infrastructure” is highly porous, NordLayer serves as a foundational tool for companies operating in sensitive sectors.

Integration with Critical Infrastructure

Evidence from Iranian-aligned cyber-attacks (e.g., MuddyWater and Lyceum) in early 2025 highlights the sectors where Nord Security’s products are most relevant.22 These attacks targeted Israeli entities in:

  • Engineering and Manufacturing
  • Local Government and Utilities
  • Transportation and Technology
  • Universities and Research Institutions.22

NordLayer is explicitly listed as a “directory supplier” for these types of high-value, high-risk organizations.22 By providing the “Zero Trust” infrastructure that protects these sectors from regional adversaries, Nord Security provides “logistical sustainment” to the broader Israeli economic and security apparatus. The ability of an Israeli utility company or an engineering firm (potentially a subcontractor for Elbit or IAI) to continue operations despite cyber-warfare is directly enabled by the security layers provided by Nord.12

Presence in Contested Jurisdictions

NordVPN’s marketing in Israel encourages users to “feel safe with NordVPN” whether they are at home or at a “local hummusiya”.24 This localized engagement, combined with the provision of Israeli IP addresses, allows individuals and potentially security operatives to appear as though they are browsing from within the pre-1967 borders, even when operating in the occupied territories.25 While this is a standard feature of any VPN, the density of Nord’s infrastructure in Israel (ranking as the #1 VPN for the region in several independent tests) suggests it is a preferred tool for institutional and professional users in the country.29

Supply Chain Integration with Defense Prime Contractors

The fourth requirement involves documenting the supply of components or services to known Israeli defense primes like Elbit Systems, Israel Aerospace Industries (IAI), and Rafael. As a software-as-a-service (SaaS) provider, Nord Security does not supply “optical glass” or “engine parts”.30 However, its role in the “digital supply chain” is critical.

Modern defense primes like Elbit Systems are increasingly focused on “military technology” and “defense contracting” that relies on cloud-native and AI-driven platforms.31 Elbit’s record $23.8 billion order backlog includes massive deals for “strategic equipment” and “intelligence capabilities”.32 For these companies to manage their global operations — which include subsidiaries in the UK, US, and UAE — they require secure, low-latency network access for their hybrid workforce.31

NordLayer’s “Zero Trust” and “Software-Defined Perimeter” (SDP) solutions are specifically designed for this type of distributed, high-security enterprise.12 While specific customer lists for NordLayer are often confidential, the platform is benchmarked alongside Israeli security giants like Check Point (which acquired Perimeter 81) and Cato Networks.33 The presence of NordLayer in the same market niche as these “Blue and White” consolidated platforms indicates that it is a viable and likely choice for the subcontractors and technology partners that feed into the Elbit/IAI/Rafael supply chain.40

Investment and Capital Nexuses

The financial backing of Nord Security provides further evidence of its integration into the defense-industrial complex. In its recent Series C funding rounds, Nord Security raised $200 million from investors including Warburg Pincus, General Catalyst, and Novator Partners.42

General Catalyst, in particular, maintains a portfolio that is heavily weighted toward “hard-tech” and “defense applications”.44 Their investments include:

  • Anduril Industries: A leading provider of autonomous defense systems and “Lattice” AI for the US and allied militaries.44
  • Helsing: An AI defense company focused on processing battlefield data in real-time.44
  • Varda Space Industries: Focused on space-based manufacturing with potential defense applications.44

The fact that the same capital pool funding the world’s most advanced autonomous weapons systems (Anduril) is also a lead investor in Nord Security suggests a high degree of “ideological and material” synergy.11 This “nexus of defense capital” ensures that Nord Security’s development path is aligned with the requirements of the modern security state, which increasingly prioritizes AI-driven, cloud-native security platforms.40

Funding Date Amount Lead Investor Contextual Portfolio
Apr 07, 2022 $100M Novator Partners Investment in Cyberspace B.V. 8
Sep 28, 2023 $100M Warburg Pincus Infoblox, NEOGOV (GovTech) 11
Series C (Part) General Catalyst Anduril, Helsing, Varda 44

Personnel Forensics and Ideological Support

The leadership of Nord Security and the Tesonet group has consistently looked to the Israeli technology ecosystem as a model for success.13 Tomas Okmanas has explicitly noted that “Israeli tech community” strengths were an inspiration for building the Lithuanian startup scene.13 This ideological alignment is reflected in the company’s recruitment and marketing strategies.

While the founders are Lithuanian, the company maintains a “global community” that includes individuals with deep experience in the Israeli security market.11 For example, the use of NordLayer is championed by IT administrators at companies like SentinelOne — an Israeli-founded cybersecurity firm that is deeply integrated into the IDF’s digital defense architecture.41 This personnel cross-pollination ensures that Nord’s product development remains responsive to the needs of the Israeli market.

Furthermore, Nord Security’s public stance on regional conflicts demonstrates a selective “corporate conscience.” In 2022, the company’s subsidiary CyberCare opened an office in Ukraine and donated money to “help arm Ukraine”.7 This precedent for “material support” in a military conflict indicates that Nord Security does not maintain a strict policy of “incidental association.” Its silence on the human rights implications of its infrastructure in Israel, contrasted with its vocal support for Ukrainian defense, suggests a geopolitical alignment that favors the security interests of its primary investors and host nations.7

Comparative Analysis: Nord Security vs. Kape Technologies

A forensic audit of NordVPN is incomplete without a comparison to its primary competitor, Kape Technologies. Kape, the owner of ExpressVPN, CyberGhost, and Private Internet Access, represents a “Tier 1” complicity profile in the Israeli context.9 Kape is owned by Israeli billionaire Teddy Sagi, a former member of the Israeli military who has significant real estate and shipping holdings.9

Kape’s history is rooted in “Crossrider,” a company that was associated with the distribution of adware before rebranding and acquiring a string of VPN companies.9 The acquisition of ExpressVPN for $936 million in 2021 remains the largest deal in the industry.9 In contrast to Nord’s “Blue and White” Lithuanian identity, Kape is an explicitly Israeli-owned enterprise that has integrated Israeli “spyware” narratives into its corporate evolution.47

Feature Nord Security Kape Technologies
Ownership Lithuanian Founders (Okmanas/Sabaliauskas) 43 Israeli Billionaire (Teddy Sagi) 9
Defense Ties Indirect/Supply Chain 22 Direct/Leadership 9
Key Product NordVPN / NordLayer 1 ExpressVPN / CyberGhost 10
Valuation $3 Billion (2023) 43 $1.58 Billion (Private, 2023) 9

While Nord Security attempts to distance itself from the “Pegasus” and “NSO Group” controversies by marketing its tools as “anti-spyware,” the underlying reality is that both Nord and Kape provide the encryption and obfuscation tools required for modern “grey zone” operations.47 Nord’s “meaningful complicity” is less overt than Kape’s but perhaps more systemic, as it provides the “Zero Trust” framework that is becoming the global standard for securing military-industrial networks.33

The Role of NordLayer in the “Agentic Cyber” Evolution

As the cybersecurity industry moves toward “Agentic Cyber” — where AI agents autonomously make decisions and execute remediation tasks — Nord Security is positioning itself as a “Foundational Pillar”.40 The “Wiz Effect” has proven that Israeli startups can achieve massive global scale by centralizing the fragmented security stack.40 Nord Security’s strategy to “centralize your organization’s security infrastructure” through NordLayer is a direct application of this model.12

For the IDF and the Israeli defense establishment, this “platformization” is vital. CISOs (Chief Information Security Officers) in the defense sector face “alert fatigue” from disconnected tools.40 NordLayer’s “single pane of glass” for network access, combined with its “AI-powered” threat detection, makes it a critical tool for maintaining the “IDF’s technological edge” in a landscape of automated, AI-driven attacks.40

The 2025 launch of “NordStellar” (a threat exposure management tool) and “Nexos.ai” (an AI governance platform founded by Okmanas and Sabaliauskas) indicates a move into the high-end strategic consulting and management space.11 These products are designed for “enterprises” and “public administrations” to manage the risks of AI integration — a top priority for the Israeli Ministry of Defense as it seeks to integrate AI into every aspect of its battlefield operations.17

Summary of Findings and Complicity Assessment

The forensic audit of Nord Security (NordVPN) identifies several markers of military complicity, categorized by the core intelligence requirements.

Direct Defense Contracting (IMOD/IDF)

There is no evidence of “Tier 1” direct contracting. However, the company’s products are widely available in the Israeli market through civilian procurement channels that serve the security establishment.14

Dual-Use and Tactical Supply

Nord Security produces high-utility tactical tools (Meshnet, NordWhisper, PQE) that are standard requirements for military OPSEC and clandestine communication.1 These are “off-the-shelf” but possess the technical specs of purpose-built military gear.

Logistical Sustainment

The company provides “digital sustainment” by maintaining significant physical infrastructure in Tel Aviv and securing the networks of critical Israeli infrastructure and engineering firms.22

Supply Chain Integration

Nord Security is a “Tier 3/4” supplier in the digital supply chain of Israeli defense primes.22 Its financial backing comes from capital pools that are deeply integrated into the US and Israeli “hard-tech” and autonomous defense sectors.11

Actionable Logistics Intelligence

For the Defense Logistics Analyst, Nord Security represents a “Neutral-Adjacent” entity whose operations materially support the Israeli state’s digital resilience. While it avoids the “meaningful complicity” of direct weapons manufacturing, it provides the “Zero Trust” framework that secures the economic and technological foundations of the occupation and its related military systems. The company’s ideological alignment with the “Israeli tech model” and its selective support for military conflicts (Ukraine) suggest that it is a strategic actor in the global “cybersecurity decacorn” race, where the interests of the security state and the private sector are inextricably linked.13

Complicity Level Marker Forensic Implication
Material Support Infrastructure in Tel Aviv Sustains local security operations 24
Ideological Support Emulation of Israeli Model Aligns corporate strategy with security state goals 13
Operational Support NordLayer in Utilities/Tech Secures the defense industrial base 22
Financial Support Defense Venture Capital Links corporate growth to military AI outcomes 11

  1. NordVPN – Wikipedia, accessed January 27, 2026, https://en.wikipedia.org/wiki/NordVPN
  2. Nord Security’s success story in Lithuania, accessed January 27, 2026, https://investlithuania.com/success-stories/nord-security/
  3. Surfshark VPN – Wikipedia, accessed January 27, 2026, https://en.wikipedia.org/wiki/Surfshark_VPN
  4. Cybersecurity M&A Roundup: 36 Deals Announced in February 2022 – SecurityWeek, accessed January 27, 2026, https://www.securityweek.com/cybersecurity-ma-roundup-35-deals-announced-february-2022
  5. Where is NordVPN based – Live Chat, VPN Setup, Troubleshooting, accessed January 27, 2026, https://support.nordvpn.com/hc/en-us/articles/19441152966161-Where-is-NordVPN-based
  6. I visited Nord Security’s HQ, in Lithuania! – YouTube, accessed January 27, 2026, https://www.youtube.com/shorts/Ro3xLyUPRnE
  7. Note that all of these companies are also under the umbrella of Tesonet, a Lithu… | Hacker News, accessed January 27, 2026, https://news.ycombinator.com/item?id=45497187
  8. Lucy Bullock | Partner | White & Case LLP, accessed January 27, 2026, https://www.whitecase.com/people/lucy-bullock
  9. Who Owns Express VPN, Nord, Surfshark? VPN Relationships Explained – Windscribe, accessed January 27, 2026, https://windscribe.com/blog/the-vpn-relationship-map/
  10. Who really owns your VPN – and does it matter? – Tom’s Guide, accessed January 27, 2026, https://www.tomsguide.com/computing/vpns/who-really-owns-your-vpn-and-does-it-matter
  11. Nord Security doubles its valuation and receives $100M investment, accessed January 27, 2026, https://nordsecurity.com/press-area/nord-security-asserts-its-leading-position-in-the-cybersecurity-market-with-a-100m-investment
  12. Secure your business with NordPass and NordLayer, accessed January 27, 2026, https://nordpass.com/nordpass-nordlayer/
  13. Tesonet – Accelerating the Digital Future and Innovation, accessed January 27, 2026, https://tesonet.com/newshub/tesonet-accelerating-the-digital-future-and-innovation/
  14. SIBAT- International Defense Cooperation | Homepage – משרד הביטחון, accessed January 27, 2026, https://mod.gov.il/en/departments/sibat-international-defense-cooperation
  15. SIBAT | Home, accessed January 27, 2026, https://www.sibat.mod.gov.il/Pages/home.aspx
  16. DIRECTORY, accessed January 27, 2026, https://eprints.ulbi.ac.id/1731/1/israel%20defense%20directory%202018%202019%20by%20Israel%20ministry%20of%20defense%20%28z-lib.org%29.pdf
  17. The startups arming the IDF: Inside Israel’s wartime tech boom | Ctech, accessed January 27, 2026, https://www.calcalistech.com/ctechnews/article/ry1a7pp00jg
  18. Israel Ministry of Defense and Home Front Command Initiate Major Security Tender on Northern Border – משרד הביטחון, accessed January 27, 2026, https://mod.gov.il/en/press-releases/press-room/israel-ministry-of-defense-and-home-front-command-initiate-major-security-tender-on-northern-border
  19. Channel Partners: Working with GitLab, accessed January 27, 2026, https://handbook.gitlab.com/handbook/resellers/channel-working-with-gitlab/
  20. Top CleanCloud by SEK Alternatives & Competitors 2025 – SoftwareWorld, accessed January 27, 2026, https://www.softwareworld.co/competitors/cleancloud-by-sek-alternatives/
  21. White Label VPN Reseller: Revenue Generation Strategy Guide, accessed January 27, 2026, https://symlexvpn.com/white-label-vpn-reseller-revenue-strategy/
  22. Hackers Systematically Target Israeli & Egyptian Critical Infrastructure, accessed January 27, 2026, https://www.cybersecurityintelligence.com/blog/-hackers-systematically-target-israeli-and-egyptian-critical-infrastructure-8953.html
  23. NordLayer 彙整 – Page 30 of 54 – Version 2, accessed January 27, 2026, https://version-2.com/en/category/nordlayer/page/30/
  24. Israel VPN: secure, fast and reliable VPN servers – NordVPN, accessed January 27, 2026, https://nordvpn.com/servers/israel/
  25. Tel Aviv VPN: secure, fast and reliable VPN servers – NordVPN, accessed January 27, 2026, https://nordvpn.com/servers/israel/telaviv/
  26. Global server list expanded to 4 new locations – NordLayer, accessed January 27, 2026, https://nordlayer.com/blog/4-new-dedicated-server-locations/
  27. Press area – Nord Security, accessed January 27, 2026, https://nordsecurity.com/press-area
  28. 5 Best Military VPNs in 2026: Very Safe & Super Fast – SafetyDetectives, accessed January 27, 2026, https://www.safetydetectives.com/blog/best-military-vpns/
  29. 9 Best VPNs for Israel: Top for Speed, Streaming and Privacy – Comparitech, accessed January 27, 2026, https://www.comparitech.com/blog/vpn-privacy/best-vpn-for-israel/
  30. Elbit Systems Awarded $228 Million Follow-on Contract to Provide Iron Fist APS for U.S. Army Bradley IFV Upgrades, accessed January 27, 2026, https://www.elbitsystems.com/news/elbit-systems-awarded-228-million-follow-contract-provide-iron-fist-aps-us-army-bradley-ifv
  31. Elbit Systems – Wikipedia, accessed January 27, 2026, https://en.wikipedia.org/wiki/Elbit_Systems
  32. Elbit Systems signs record $2.3 billion weapons deal with undisclosed international buyer, accessed January 27, 2026, https://www.ynetnews.com/business/article/hjjrwuuezx
  33. 10 best network firewall solutions for businesses – Version 2 Limited, accessed January 27, 2026, https://version-2.com/en/2024/09/10-best-network-firewall-solutions-for-businesses/
  34. Violating the Terms of Service: Microsoft, Azure and the IDF – CounterPunch.org, accessed January 27, 2026, https://www.counterpunch.org/2025/09/29/violating-the-terms-of-service-microsoft-azure-and-the-idf/
  35. From Unit 8200 to Wiz’s $32B exit: The blueprint for Israeli cyber success | Ctech, accessed January 27, 2026, https://www.calcalistech.com/ctechnews/article/sjltwsk2kg
  36. NordVPN Outlines Major Quantum and Cyber Threats Emerging in 2026, accessed January 27, 2026, https://thequantuminsider.com/2026/01/12/cybersecurity-risks-2026-nordvpn/
  37. Watch BBC iPlayer in Israel – Privacy HQ, accessed January 27, 2026, https://privacyhq.com/watch-bbc/israel/
  38. Elbit Systems $2.3 billion defense deal | Israel Hayom, accessed January 27, 2026, https://www.israelhayom.com/2025/11/17/elbit-systems-defense-contract-israel/
  39. UAE named as Elbit’s mystery $2.3 billion customer | The Jerusalem Post, accessed January 27, 2026, https://www.jpost.com/defense-and-tech/article-880703
  40. The Wiz effect: Israeli cybersecurity is entering a new era of scale – Citi.com, accessed January 27, 2026, https://www.citi.com/ventures/perspectives/opinion/the-wiz-effect-israeli-cybersecurity.html
  41. 50 World’s Best Cyber Security Companies in 2026 (March), accessed January 27, 2026, https://cybersecuritynews.com/best-cyber-security-companies/
  42. Nord Security – 2026 Funding Rounds & List of Investors – Tracxn, accessed January 27, 2026, https://tracxn.com/d/companies/nord-security/__eF7C2HM7RxS1GCOJqUCkxdN_V1W9S1bPV446EBRklN4/funding-and-investors
  43. Nord Security – 2026 Company Profile, Team, Funding, Competitors & Financials – Tracxn, accessed January 27, 2026, https://tracxn.com/d/companies/nord-security/__eF7C2HM7RxS1GCOJqUCkxdN_V1W9S1bPV446EBRklN4
  44. Invest and Sell Nord Security Stock – Forge Global, accessed January 27, 2026, https://forgeglobal.com/nord-security_stock/
  45. A list of 20 essential cybersecurity tools for 2026 – NordVPN, accessed January 27, 2026, https://nordvpn.com/blog/cybersecurity-tools/
  46. NordLayer vs Okta Customer Identity comparison – PeerSpot, accessed January 27, 2026, https://www.peerspot.com/products/comparisons/nordlayer_vs_okta-customer-identity
  47. Are governments targeting their own journalists with surveillance spyware? – NordVPN, accessed January 27, 2026, https://nordvpn.com/blog/pegasus-project-surveillance-report/
  48. What Is Spyware? Definition, Types and How to Prevent It – NordLayer, accessed January 27, 2026, https://nordlayer.com/learn/threats/spyware/
  49. Global Richest Businesspeople Analysis – 2 | PDF | Wealth – Scribd, accessed January 27, 2026, https://www.scribd.com/document/890587156/Global-Richest-Businesspeople-Analysis-2
  50. VPNs evolve into comprehensive security platforms| Business News – Hindustan Times, accessed January 27, 2026, https://www.hindustantimes.com/business/vpns-evolve-into-comprehensive-security-platforms-101733165143101.html
  51. Israeli firm XTEND, whose drones reportedly killed Sinwar, wins major US defense deal, accessed January 27, 2026, https://www.ynetnews.com/business/article/bkcdsowgzl
  52. Tomas Okmanas – Wikipedia, accessed January 27, 2026, https://en.wikipedia.org/wiki/Tomas_Okmanas
  53. nexos.ai raises €30M Series A to solve enterprise AI adoption crisis, accessed January 27, 2026, https://nexos.ai/blog/nexos-funding-announcement/

 

Related News & Articles