top of page

QUICK WINS – ENCRYPTION

Prevent Data Leakage Data breaches happen and will continue to happen. There will always be some vulnerability / backdoor /...

Cyber Security Service Offering

CISO as a Service The single most important role in defining a cyber security strategy is the company Chief Information Security Officer....

The Next Cyber Attack is at Your Doorstep

A Frightful Scenario Imagine that tomorrow at 9:30PM your website is attacked and defaced. The beautiful landing page you spent weeks and...

Cyber Threat Actors

5 types of cyber threat actors 1. Cyber Superpowers 2. State-Sponsored 3. Cyber Criminals 4. Hacktivist / Anarchist 5. Internal Error /...

Classify Your Data. The Why's and How's

What is Data Classification Cyber security attempts to reduce risk posed to the company by bad actors manipulating company data to their...

Facebook Breach of Trust? Really?

Facebook Breach of Trust? So Facebook sold information relating to 50 million of its users to Cambridge Analytica. I'm sorry to say this...

Managers on the Cyber Front Lines

When meeting with IS (Information Security) and IT professionals, senior management and board members sometimes feel overwhelmed. As...

Why you should happily adopt GDPR

Forget about fines – Here’s why you should adopt GDPR Yes, deadline has been set for May 25, 2018. Yes, fines may reach €20 million or 4%...

Stopping Cryptominers

In a March 13, 2018 blog post by Imperva’s Elad Erez and Luda Lazar, they revealed an ongoing attack which uses a picture of Scarlett...

GDPR

GDPR: The Race for Compliance On April 14, 2016 the EU Parliament approved the General Data Protection Regulation – GDPR. This initiative...

10 Ransomware Facts

Here are 10 facts you should know about ransomware and why it is such a threat.

Cybertech 2018: My Cyber-Insights

Starting Monday, January 29, arguably the biggest Cyber Technology event in Israel took place in Tel Aviv. Each year this event lets...

bottom of page