In the latest TAG Report, HYAS CEO, David Ratner shares his thoughts on why the NSA and CISA recently issued guidance on the importance of DNS data

Victoria, British Columbia – July 15, 2021 – HYAS, a leader in actionable cyber threat intelligence and pre-attack adversary infrastructure knowledge, is proud to announce its designation as a Distinguished Vendor in the most recent TAG Cyber Security Quarterly report. HYAS joins an exclusive group of industry-leading cyber security solution providers in the report’s featured interviews to share insights on Protective DNS (PDNS).

In 2021, the frequency and scale of cyberattacks have increased and touched businesses and critical infrastructure ranging from hospitals to power plants. Amid the growing intensity and risks associated with these threats, it has become crystal clear that the game plan to defend and protect businesses and organizations needs to be adjusted. The ability to see how the attacks will be launched is the game changer that enterprises, governments, and individuals need to stay one step ahead of looming threats and protect against the damage they can inflict on vital systems. 

TAG Cyber selected HYAS as one of only a handful of industry-leading cybersecurity and information management technology solution providers, to assist with its new report. The latest report features independent and cutting-edge research and insights on topics such as data breaches, identity and vulnerability management, and many others. The report is available today for free download here.

“We’re excited to be contributing to the new edition of the TAG Cyber Security Quarterly,” said David Ratner, CEO of HYAS. “Recent ransomware attacks and other threats to enterprise and critical infrastructure are an important backdrop for us to participate in this report alongside other vendors who are working diligently to mitigate cyber and IT risks. The report is a must read for the cyber security and IT communities, both across the private and public sectors.”

The Q3 2021 Security Quarterly offers expert guidance, analysis, and education across the entire cyber security ecosystem.  

“We are thrilled to feature HYAS in this publication,” said Katie Teitler, VP of Research and Advisory at TAG Cyber. “HYAS’ solutions are helping to advance a more proactive approach to mitigating threats and are of great interest and importance to IT and security professionals right now.”

About HYAS

HYAS, a First Nations word meaning “great and powerful,” is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure.  While much of the cybersecurity industry is still reacting to the emerging actions of bad actors, HYAS takes a preemptive stance and leverages its infrastructure knowledge to stop attacks before they can get started and ensure executives have the confidence to take their organizations wherever they need to go. HYAS provides the industry’s first security solution that integrates into an organization’s existing security technology stack to proactively detect and mitigate cyber risks before attacks happen, and to identify the infrastructure behind the attacks. Threat and fraud response teams use HYAS to hunt, find, and identify adversary infrastructure while enterprises proactively block both known and not-yet-launched phishing, malware, supply-chain and ransomware attacks. For more information about HYAS, visit

About TAG Cyber

TAG Cyber is a trusted cyber security research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. Founded in 2016 by Dr. Edward Amoroso, former SVP/CSO of AT&T, the company bucks the trend of pay-for-play research by offering in-depth research, market analysis, consulting, and personalized content based on hundreds of engagements with clients and non-clients alike—all from a former practitioner perspective. For more information, visit

#          #          #



Why Monitoring Flow Data Means You’re Only Seeing Half the Picture

Solutions Review
Read More

The Key to Preventing Production Network Attacks Is to Start Looking Within

Security Today
Read More

How Security Technology Enables the Digital Workplace

Read More