Pushing Forward with Silent Push

Written by David Ratner
Now SVP at Silent Push and former CEO of HYAS, David Ratner is a seasoned operator who blends technical depth with global leadership to scale SaaS and security companies through complex growth and product reinventions.
Cybersecurity has spent decades perfecting the art of reacting. Faster alerts. Better correlation. More automation once something has already gone wrong. Automated playbooks and the power of agentic AI to make these reactions nearly automatic.
But the attacks didn’t stop, and in many ways have actually accelerated. Breaches continued. We continue to be plagued by financial, reputational, and other damage caused by these attacks. Even human life is impacted.
There is one simple but uncomfortable truth: by the time most security tools alert, the attacker has already won. We’re detecting what they’ve done, and either hoping we can see it and stop it before real damage ensues, or hoping we can now put it on some deny list to protect other organizations before they are similarly impacted. Strategies that depend on hope are neither practical nor pragmatic or reliable. The only real durable advantage defenders can reclaim is time – how fast can they react. To really implement a reliable, effective strategy that doesn’t rely on hope, one needs to see intent before compromise.
That belief is why HYAS becoming part of Silent Push makes so much sense – not just strategically, but philosophically.
Silent Push: Turning Signals Into a Living Context Graph
Where HYAS brought unique and exclusive adversary infrastructure data, Silent Push brings something equally, if not more important: deep expertise in both assembling disparate signals into a coherent, explainable whole context graph, and providing the clear, understandable outcome of “what does this mean” and “what you should do.”
Silent Push’s core strength is not just collecting data; it’s connecting it, discerning the patterns, and either providing outcomes and finished intelligence or providing the raw data and access to the context graph for analysts to perform their own investigations and generate their own outcomes.
Because when you study infrastructure at scale, and continually over time, you stop chasing indicators and start recognizing patterns and intent. The common thread across all of this work is simple: future attacks have specific fingerprints that you can see before they strike.
By combining both HYAS data and Silent Push capabilities, spanning global Internet telemetry, change detection, infrastructure fingerprints, and threat research, into a continuously evolving Context Graph, Silent Push enables security teams to see:
- How infrastructure relates, not just whether it’s malicious
- How attacker preparation unfolds over time
- How small, early changes signal future risk
- How patterns repeat across actors, regions, and campaigns
This is what turns raw intelligence into decision advantage.
For those who are focused on their specific mission and task, whether that is proprietary investigations, detection of digital fraud, ensuring compliance from an AML/KYC perspective, or even detecting fake workers trying to enter the organization, the Context Graph provides the ability to rapidly answer the hard questions. For those deploying Agentic AI within their processes, the Context Graph provides the data required for AI to make the right decisions.
And for those looking to counter the next attack before it happens, Silent Push provides easy-to-understand and proven Indicators of Future Attack™ (IOFA™) – signals that are:
- Explainable
- Defensible
- Actionable before compromise
The combination of HYAS and Silent Push provides not just the data investigators need but the complete understanding, context, and finished intelligence that users need to operationalize it. Or, as one Head of Threat Intelligence at a Fortune 100 company put it:
“We think this combination is going to be incredibly powerful.”
They’re right – because the combination is unique, rare, and unparalleled in power.
Why Preemptive Defense Is No Longer Optional
Attackers don’t wake up and compromise an enterprise, commit fraud, move money to a sanctioned nation, sneak a spy into your organization, or otherwise commit illicit actions in a single step. They prepare.
They register infrastructure. They test hosting. They rotate certificates. They stage domains. They adjust configurations. They probe quietly.
All of that happens before a phishing email is sent. Before malware is delivered. Before ransomware detonates. Before the action occurs.
And reactive security tools are blind during this phase.
Preemptive cyber defense isn’t about predicting the future. Prediction is always fallible to false positives and false negatives. Preemptive cyber defense is about recognizing preparation. It’s about neutralizing threats before they become incidents, investigations, headlines, or board-level crises based on fact-based decisions.
This is the shift from:
- Responding faster → Seeing earlier
- Blocking artifacts → Disrupting intent
- Counting alerts → Measuring time advantage
And it doesn’t matter if you have people or AI responding to your alerts. Regardless of the speed of reaction, every organization requires this combination to really defend itself, and every investigative unit needs this combination to see what criminals and nation states try to obfuscate.
Introducing Traffic Origin
The Silent Push acquisition of HYAS has led to a powerful new capability: Traffic Origin. Silent Push Traffic Origin shifts your security posture from reactive to proactive by exposing the true upstream country-of-origin of the adversary, whether they are hiding via residential proxy, laptop farm, VPN or other obfuscation techniques.
By providing origin certainty where other tools see only obfuscation, Traffic Origin allows investigators to identify high-risk remote sessions before they escalate into attacks or credential theft.
Right Team, Right Moment
Joining Silent Push isn’t about just some acquisition.
It’s about assembling the pieces of a new category. Together, Silent Push + HYAS enables security teams to act before damage occurs – not after. It enables AML and KYC teams to make proactive and preemptive decisions. It enables organizations to know what criminals are trying to hide, and enables investigators to find and see what their targets don’t want them to.
For customers, this means fewer incidents, less chaos, and real strategic advantage. For practitioners, it means working on problems that actually matter. For the industry, it means finally breaking the endless loop of reactive defense.
Preemptive cyber defense isn’t a slogan. It’s the next evolution of how security has to work.
And this combination is built to lead it.
If you’d like to learn more about Traffic Origin and the Silent Push preemptive cyber defense platform, you can get a 1:1 walkthrough with us here.

