
Dangerous Backdoor Found in Two XZ Utils Versions – Implications and Risk
A Wake-Up Call: Navigating the Risks of Open-Source Software in the Automotive Industry The past few days, companies have been reeling from news of a
" " indicates required fields

A Wake-Up Call: Navigating the Risks of Open-Source Software in the Automotive Industry The past few days, companies have been reeling from news of a

In 2023 alone, more than 10 customers and partners signed commercial agreements with C2A Security, including a global, long-term enterprise agreement with a European Commercial

Jerusalem, Israel, and Ho Chi Minh City, Vietnam, March 2024 – VinCSS Cyber Security Services Joint Stock Company today announced its joint project with C2A

Chaim Frish: An Extraordinary Story of Determination, Courage, and Hope for a Positive Economic Future In August 2023, our own Chaim Frish sat down with

January 3, 2024 – Jerusalem, Israel and Shanghai, China: C2A Security, a risk-driven cybersecurity company, has been chosen by ThunderSoft for its new vehicle operating

Agreement integrates C2A Security’s mobility-centric DevSecOps Platform with the Application Lifecycle Management solution

AutoSynth is a Novel Infrastructure Layer that Allows to Quickly Add New
AI-Based Automation Capabilities to the Product Security Lifecycle

Is #GenAI ‘widely overhyped in the short term’ as OpenAI’s Sam Altman commented, or are we really at the doorstep of something incredible? Exploring generative

Hitzinger brings two decades of experience in senior leadership roles with VW, Apple, and Porsche
CRO
C2A Security
VP and GM, Medical Technology
C2A Security
Ken Zalevsky brings over 20 years of medical device cybersecurity experience to his role at C2A Security, where he serves as VP and GM, Medical Technology, following the acquisition of Vigilant Ops in October 2025. A former Bayer executive, Ken founded Vigilant Ops in 2019 after witnessing the consequences of inadequate technical preparation in the healthcare industry. He is an active contributor to CISA’s SBOM working groups and a frequent speaker on software supply chain security. Ken’s mission: transform SBOM from a compliance checkbox into operational intelligence that keeps patients safe while streamlining regulatory processes.