How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as white hat pentesting, a penetration test detects and [...]
Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best IT security directors will confess that they [...]
PM, German Chancellor attend an innovation exhibit, and meet with Israeli and German businesspeople at the Israel Museum in Jerusalem.
Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]
Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant [...]