January has a way of exposing which security stories are noise and which ones actually move product, people, and power. This one lands squarely in the second camp. On January 13, 2026, Cyera and Abnormal Security made their partnership official, then walked it straight onto the floor at Abnormal Innovate the very next day. No theatrics. Just a clean handoff between two companies that understand data risk is no longer a sidebar conversation. It is the main event, and the lights are already on.

Cyera, built to see data the way attackers do, has been sharpening its DLP edge since acquiring Trail Security in October 2024. Trail Security was founded in September 2023, moved fast, and got absorbed for a reason. The signal got stronger, not diluted. Zohar Vittenberg, Co-Founder and Chief Executive Officer of Trail Security and now Head of Cyera DLP, alongside Roei Mutay, Co-Founder and Vice President of Research and Development at Trail Security, brought velocity to a problem most platforms still tiptoe around. Nadav Zingerman, Co-Founder and Chief Technology Officer of Trail Security, continues to lead Cyera’s DLP technology and product strategy, proving that titles matter less than trust in the architecture.

On the Abnormal Security side, the posture is just as deliberate. Evan Reiser, Chief Executive Officer and Co-Founder, has spent years turning behavioral signals into something security teams can actually use. Sanjay Jeyakumar, who co-founded Abnormal Security in 2018 and helped scale it through its breakout years, now sits on the Board of Directors while building 1Sphere AI, founded in September 2025. That separation of duties matters. It keeps the focus clean and the incentives aligned. Tamar Bar-Ilan, Co-Founder and Chief Technology Officer at Cyera, and Yotam Segev, Co-Founder and Chief Executive Officer, are not selling a vision. They are shipping one.

What makes this partnership land is the wordplay baked into the product reality. Abnormal is about behavior that does not belong. Cyera is about data that should not be exposed. Together, they are less about alarms and more about answers. This is not theoretical security. This is operational math, running in environments where mistakes are expensive and silence is worse.

Leave A Reply

Exit mobile version