Brand-impersonation defence is splitting into two camps. One waits for the attack to run, with customers phished, employees credential-harvested, and finance teams paying a fake invoice, and then races to take the infrastructure down. The other finds the infrastructure during setup and removes it before it has sent a single email. Which camp you sit in is the signal adversaries use to decide whether you are a soft target worth coming back to, again and again.
In February, the TEISS judges named DefendDomain Cyber Security Start-up of the Year 2026. Practitioners picked a company built for the second camp. Not customers. Not analysts. That is the part of this announcement I think is worth a few minutes of your time.
The regulators got there first
The reason this matters now is that the regulatory direction of travel has already moved. NIS2 changes posture more than it changes paperwork: 24- and 72-hour reporting plus management liability push organisations from reactive incident response to proactive risk posture, and Article 21's risk-management measures explicitly name supply-chain and third-party exposure. Brand impersonation against your customers, your staff, and your suppliers sits squarely inside that surface. The NCSC's Cyber Assessment Framework, now adopted by UK sector regulators including Ofcom and the ICO, rewards demonstrable proactive controls, not just incident reports filed on time. Even the US Cyber Safety Review Board, before it was disbanded, repeatedly found the same thing in its post-incident reviews: these attacks were preventable, and the cheapest place to stop them is before they start.
Regulators are moving organisations from reactive incident response to proactive risk posture, and brand impersonation is one of the surfaces they're naming. The industry is starting to recognise it too.
Where the cost actually lands
“Post-attack takedown” became the default not because anyone thinks it's a good idea, but because until recently it was the only thing on offer.
A customer clicks a link in a convincing email, lands on a typosquatted version of your login page, and hands over credentials. By the time you notice, they have already churned, and the ICO has questions.
An employee does the same thing on a cloned single-sign-on portal. Their session is hijacked. Two weeks later, ransomware is moving laterally inside your network.
Your finance team pays an invoice from a one-letter-off supplier domain. Same logo, same signature block, different IBAN. The money is gone before the legitimate supplier asks where their payment is.
Early detection plus early takedown beats post-attack response. By the time you discover the attack, the cost is already yours. Customers defrauded, employees phished, your finance team paying a fake supplier invoice.
We do take down attacker infrastructure end to end, automated, with re-detection if the infrastructure comes back. The argument is not against takedown. It is about when the takedown clock starts. Ours starts before the infrastructure has been used. The reactive model's starts after.
How early actually works
The mechanism, in one paragraph: we watch for attacker infrastructure during the setup phase, across domain registration, certificate issuance, and content cloning. That runs to roughly four million domain scans a month and seventy-five million certificate scans a day. Two of those detection layers, embedded markers and content fingerprinting, spot a clone of your site the moment it loads, anywhere on the web, before a single phishing email has been sent. That window, between infrastructure live and infrastructure used, is the only one in which the cost still belongs to the attacker.
What this means for the next 12 months
The discipline is moving from “how fast can you respond” to “how early can you intervene.” Regulators are pushing it. Practitioners are recognising it. The companies that get there first stop paying the cost of attacks that never needed to happen, because by the time those attacks land on customers, on staff, on supplier invoices, the cost is no longer the attacker's roadblock. It is yours.
That is the shift worth paying attention to. The award is just the moment the wider industry noticed.
James Bending is co-founder and CRO of DefendDomain. The company is also a finalist in the National Technology Awards 2026 and the Computing Security Excellence Awards 2026.
