Sygnia's CEO Replacement: A Second Change in Six Months

Sygnia CEO replacement Guy Segal cybersecurity leadership Avi Golan MFT slack space
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
September 29, 2025
3 min read

Sygnia Replaces CEO

Sygnia has replaced its CEO for the second time in six months. Guy Segal will take over the role soon after Avi Golan was appointed in March 2025. The reasons behind Golan's departure remain unclear.

Sygnia replaces CEO for the second time in six months | CTech


Image courtesy of CTech by Calcalist

For more details, refer to Sygnia replaces CEO for the second time in six months and CTech news.

Guy Segal's Background

Guy Segal is the new CEO of Sygnia, overseeing the company's strategy and operations. With over 25 years in cybersecurity, Segal has significant experience in analytics and business leadership. He has previously held senior positions, including Head of APJ and initiator of Sygnia's Managed Detection and Response (MDR) practice.

Management Image


Image courtesy of Sygnia

Prior to Sygnia, Segal was the General Manager at Custodio-Technologies and worked as Cyber Security Leader for IBM Security. He also served in Unit 8200, the IDF's elite cyber unit. Segal holds an EMBA from Ben-Gurion University and lectures on cybersecurity.

For more information on Segal, visit Guy Segal - Sygnia.

Sygnia's Leadership Team

Sygnia's leadership team has extensive expertise in cybersecurity and technology. Key members include:

  • Adam Finkelstein, SVP of Global Client Leadership, oversees business development and security initiatives globally. More details can be found at Adam Finkelstein.

Adam Finkelstein


Image courtesy of Sygnia

  • Adi Keinan, CFO, has over 20 years of experience in finance and corporate functions. More about him can be found at Adi Keinan.

Adi Keinan


Image courtesy of Sygnia

  • Shoham Simon, SVP of Global Cyber Services, previously led incident response efforts. Additional information is available at Shoham Simon.

Shoham Simon


Image courtesy of Sygnia

For a complete overview of Sygnia's leadership, visit Sygnia's Leadership Team.

The Forensic Value of MFT Slack Space

MFT slack space in NTFS is crucial for digital forensics. It often goes unnoticed by standard forensic tools but can reveal vital file metadata, even in Windows 10 and 11 systems.

MFT Slack Space


Image courtesy of Sygnia

The Master File Table (MFT) records essential file-system metadata. Each file has at least one MFT record, typically 1024 bytes, where slack space can remain unused. This unused space is called MFT slack space, which is often not visible to digital forensics software.

Deleted or securely wiped file metadata can be found in MFT slack space, making it critical for investigations. This is particularly significant for real-world incident response engagements, where recovery of metadata is often necessary.

Learn more about MFT analysis in The Forensic Value of MFT Slack Space.

Analysis Techniques

Parsing the MFT

Two notable open-source tools for parsing MFT are Eric Zimmerman's MFTECmd and Maxim Suhanov's dfir_ntfs. Both tools can recover file metadata from MFT slack space.

Tool Comparison: MFTECmd vs. dfir_ntfs

MFTECmd may detect possible slack index entries, whereas dfir_ntfs can recover more comprehensive information, including timestamps and file size. Suhanov's updates have improved detection mechanisms for partially overwritten entries.

MFTECmd vs dfir_ntfs


Image courtesy of Sygnia

Manual Analysis

Manual analysis using a hex editor can also be effective for specific directories. This has been beneficial for recovering critical information during incident response engagements.

Keyword Search

Searching for filenames as Wide Character strings in MFT files can help locate residual data, although this method may fail if the filename is partially or fully overwritten.

For further details on manual analysis and keyword searching, refer to The Forensic Value of MFT Slack Space.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article