Interview

Anuj Goel, CEO and Co-founder of Cyware – Interview Series

July 1, 2025

Anuj Goel is the CEO and Co-founder of Cyware, where he leads the development of cutting-edge cyber fusion technologies designed to transform how organizations manage threat intelligence and security operations.

Anuj Goel is the CEO and Co-founder of Cyware, where he leads the development of cutting-edge cyber fusion technologies designed to transform how organizations manage threat intelligence and security operations. Before founding Cyware, Goel held senior roles at Citi and collaborated with Cyware's CTO Akshat Jain through earlier stints at Adobe and Oracle. Under his leadership, Cyware has earned recognition for its innovation in cybersecurity, including placement on the Deloitte Technology Fast 500 list. Goel frequently shares insights on cyber fusion, threat response, and leadership developments through his LinkedIn presence.

Cyware builds advanced cybersecurity platforms that unify threat intelligence, automation, and coordinated incident response. Its flagship Cyber Fusion Platform allows organizations to centralize security operations, enabling real-time threat sharing and automated workflows across diverse security environments. The technology supports threat intelligence processing, low-code SOAR capabilities, and proactive defense coordination, helping both private and public sector clients streamline and strengthen their cybersecurity posture. Cyware’s architecture is designed to eliminate silos, speed up detection, and create a collaborative defense ecosystem powered by AI and machine reasoning.

Let’s start with your journey—what inspired you to transition from cybersecurity leadership roles at Citi into founding Cyware?

At Citi, I led global cyber strategy. This role gave me direct exposure to the operational gaps in large security programs, particularly the lack of integration between threat intelligence and day-to-day security operations. While large organizations were investing in collecting threat intelligence from various sources, most of it remained underutilized because it was not contextualized or operationalized in real-time.

I saw an opportunity for breaking silos between various security functions that did not share threat data with each other. One of the biggest gaps I observed was the lack of orchestrated response and last-mile actioning. Even when threat intelligence was available, acting on it across different systems required manual effort, causing delays and missed threats.

Akshat Jain and I co-founded Cyware to solve these challenges. The goal was to create a platform that connects threat intelligence with security operations, enabling organizations to contextualize data, automate workflows, and collaborate across teams for faster, more effective response.

When you launched Cyware in 2018, what specific gaps did you see in threat intelligence and cyber fusion that existing solutions weren’t addressing?

When we launched Cyware in 2018, we saw a clear gap between threat intelligence processing and its actual use in day-to-day security operations. Many solutions focused on aggregating threat data, but very few helped security teams make that intelligence relevant, timely, and actionable. Organizations were collecting large volumes of threat intel but lacked the tools to contextualize it and integrate it into their detection and response workflows.

Another major gap was the absence of automation to apply threat intelligence across different environments. Most teams were still relying on manual processes to analyze and act on intel, which led to delays and inefficiencies. There was also limited collaboration across teams, making it harder to respond in a coordinated way.

We built Cyware to close these gaps. Our goal was to help organizations transform raw threat data into meaningful insights, automate the operational use of that intelligence, and enable real-time sharing and collaboration so teams could move faster and stay ahead of threats.

Cyware Quarterback AI brings an agentic AI approach to security operations. What does “agentic AI” mean in your context, and how does it change the game for security teams?

Agentic AI, in our context, refers to autonomous, purpose-driven software agents that can understand intent, make decisions, and take action across the security environment. Cyware Quarterback AI’s Agentic model is being built as a multi-agent system comprising specialized agents such as the Ingestion Agent, Enrichment Agent, Correlation Agent, Threat Hunting Agent, Actioning Agent, and Threat Intel Sharing Agent. These agents work together in real time to manage the entire security lifecycle, from ingesting data to executing response and sharing intelligence.

What makes Cyware’s approach unique is that it is built on top of its Quarterback AI-powered orchestration platform, which includes more than 400 native integrations with security and IT tools that may be deployed across cloud, on-premises, and hybrid environments. This allows the AI to move beyond just analysis or recommendations and actually execute actions across the tool stack. For security teams, this results in faster, more reliable operations without the overhead of manual processes, enabling them to stay ahead of threats with greater speed, precision, and consistency.

How do you balance the power of automation with the critical need for human judgment in incident response workflows?

At Cyware, we follow a “human in the loop” approach, where AI handles routine and repetitive tasks independently but defers the most critical decisions to human analysts. This ensures that human judgment remains central to incident response while automation improves speed, efficiency, and consistency.

Unlike the traditional “AI in the loop” model, where AI drives the process and humans are only consulted, our approach keeps humans in control of high-impact decisions. Quarterback AI manages non-critical tasks such as data ingestion, enrichment, correlation, and low-risk response actions on its own. When it comes to decisions that carry greater risk or require deeper context, it alerts the analyst and seeks approval.

This structure allows security teams to benefit from the scale and speed of automation without sacrificing control or oversight. It enables faster response, reduces alert fatigue, and ensures that expert judgment is applied where it is most needed.

Credential compromise is one of the fastest-growing threat vectors today. How does Cyware’s approach to credential exposure monitoring stand out—particularly through AI-driven automation?

Credential compromise continues to be one of the fastest-growing threats, often serving as a gateway to more serious breaches. Cyware addresses this risk by combining high-quality credential exposure intelligence with advanced automation that drives real-time, context-aware response.

What makes our approach unique is how we contextualize and act on credential exposure data. When exposed credentials are detected, our system automatically analyzes factors such as user role, asset sensitivity, and business impact to prioritize incidents. This ensures that security teams focus on the exposures that matter most.

Through our advanced automation, our platform can take immediate actions such as notifying users, resetting passwords, expiring active sessions, creating incident investigation tickets, or alerting users or security teams via widely used communication apps such as Slack. These actions are executed based on predefined automation rules, reducing the need for manual intervention while accelerating response times.

By transforming static exposure alerts into automated, policy-driven actions, Cyware helps organizations respond to credential threats with speed and precision.

Threat intel often becomes siloed or underutilized. How does Cyware operationalize that data across security tools to ensure it drives action instead of sitting idle?

Threat intelligence often goes underutilized because it remains disconnected from the tools and workflows that rely on it. Cyware addresses this by operationalizing threat data across the entire security ecosystem, ensuring it drives timely and meaningful action.

Our platform enables security teams to aggregate intelligence from multiple sources such as commercial providers, Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs), regulatory bodies, national Security Operations Centers (SOCs) and Computer Emergency Response Teams (CERTs), and open-source intelligence, and enrich it through external enrichment services. We further contextualize this intelligence using internal telemetry, including data from Security Information and Event Managements (SIEMs), Endpoint Detection and Response (EDR) platforms, asset inventories, and historical incident records.

The enriched and contextualized intelligence is then distributed across connected tools such as detection platforms, firewalls, and ticketing systems using our AI-driven -orchestration framework, which supports over 400 native integrations. This allows for immediate correlation, proactive threat blocking, and automated response across diverse environments.

By embedding threat intelligence directly into operational workflows, Cyware transforms it from static information into a real-time driver of defense.

Can you talk about the role Cyware plays in enabling secure, real-time threat sharing between ISACs, CERTs, and enterprises? How important is this to building resilient digital ecosystems?

Cyware plays a critical role in enabling secure, real-time, and bi-directional threat sharing for ISACs, CERTs, and enterprises by providing the underlying technology that powers collective defense. Within ISACs, member organizations can securely exchange threat intelligence including Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs), and contextual advisories based on defined trust boundaries and access controls. Enterprises also use Cyware to share relevant intelligence with their internal business units and external suppliers, creating a unified security fabric across their environments.

We have built the industry’s first cross-sectoral threat intelligence sharing highway, allowing sectoral ISACs to share curated intelligence with one another. This capability enables organizations in one sector to learn from threats detected by organizations in other sectors and proactively execute mitigation measures. It strengthens coordination across industries and helps anticipate risks before they affect other critical sectors.

By enabling trusted and timely threat sharing at scale, Cyware transforms fragmented insights into coordinated defense, strengthening the resilience of digital ecosystems.

Your platform emphasizes measurable impact—like reducing threat detection time from weeks to minutes. What’s one real-world example where Cyware significantly changed the outcome of a security incident?

One of the most recent examples involved a large enterprise customer facing an active security incident. A widely used security tool had incorrectly assessed the situation, leading to delays in identifying the attacker’s activity. During this time, the customer was running a proof of concept with Cyware and used our platform to conduct an intel-driven investigation.

By embedding threat intelligence into investigation and tracing the attacker's movements, the customer was able to uncover key evidence that had been missed. The investigation conducted through our platform became a central part of their incident analysis and was later submitted as evidence to law enforcement.

This case highlights how Cyware empowers security teams to go beyond alerts and perform contextual investigations that are both actionable and defensible. It also demonstrates the value of combining intelligence, automation, and visibility in uncovering the full scope of an incident.

With a platform that integrates across 400+ tools and security systems, how do you ensure a seamless deployment experience, especially for overburdened security teams?

We design our platform to integrate quickly and seamlessly into existing environments without adding complexity for already stretched security teams. With over 400 pre-built integrations across security and IT tools, most connections are plug-and-play, requiring minimal configuration.

Our deployment approach is modular and flexible, allowing organizations to start with specific use cases and expand over time. We also provide guided onboarding, hands-on support, and pre-configured workflows that align with common operational needs, reducing the lift on internal teams.

By focusing on interoperability, automation, and simplicity, we ensure that organizations can realize value quickly without lengthy implementation cycles or heavy resource requirements.

Looking five years into the future, how do you envision the role of agentic AI evolving within cybersecurity—and what will Cyware’s place be in shaping that future?

Five years from now, agentic AI may evolve into a near-autonomous force within cybersecurity, capable of managing complex detection, response, and threat-sharing tasks with minimal manual intervention. These AI agents will work collaboratively across systems, continuously learning from their environment and acting based on real-time context, risk signals, and organizational priorities.

At Cyware, we are shaping this future by embedding agentic AI into the core of our platform. Our multi-agent architecture is designed to drive intelligent decision-making and automated execution across the entire cyber defense lifecycle. This ensures that AI accelerates operational tasks, while human expertise remains central where it is most needed.

By combining agentic AI with our orchestration engine, deep integrations, and real-time threat-sharing capabilities, Cyware will continue to lead in delivering smart, adaptive, and collaborative security operations. Our goal is to help organizations stay ahead of threats with security that is proactive, scalable, and context-aware.

View Interview

Next Up