October 2016

Cybersecurity, Stock Photos, & Halloween: What Do They Have In Common?

2017-01-10T21:08:04+00:00

The cyber world is a world of deceit, masquerade and obfuscation. No cyber-criminal or hacktivist use their real name or shares their photo online, and they always make sure to hide their IP address and geographical location. In this world,  everyone is masked. In this dark world, it's filled with mischief and terror, lives mystery. [...]

Innovation Disrupts Cybersecurity Into A Digital Transformation

2016-12-25T07:57:18+00:00

We are accustomed to think that the evolution in cybersecurity is driven by the bad guys. This was indeed true in the past- the virus was invented in the 80's and the counter-product, the anti-virus, was developed to mitigate it. Many more technologies and counter-measures followed: DOS/ DDoS and DDoS mitigation, web based attacks and [...]

Can Cybersecurity Become a Business Enabler or Hinderer?

2016-12-25T07:05:34+00:00

In their recent cyber risk report,  “The collateral damage of cybercrime”, HPE reveals that the number of organizations recognizing the true financial impact of a breach is growing dramatically, but in the meantime, as these organizations are investing heavily in cyber-security, there's often little or no payoff to this huge investment. Combine the two insights [...]

September 2016

Whatcha Ya Gonna To Do When The Nation-State Hackers Come For You?

2017-01-10T21:08:42+00:00

It’s a well-known fact that nation states have almost unlimited cyber powers. Nation states with unlimited military resources, technical know-how and political motivation gave rise to the infamous APT (“Advanced Persistent Threat”), meaning that an adversary with enough resources and motivation has the ability to hack anyone, regardless of their security mechanisms. While both an [...]