Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]
Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on July 30 that the Department of Defense (DOD) has been quietly developing a “Do [...]
Finally, your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime, managed last-minute tasks and set up your automatic reply. So, [...]
Named in “Market Guide for Vulnerability Assessment” and “Hype Cycle for Threat-Facing Technologies, 2018”
Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead of the hackers.
Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual list of the most innovative [...]
Bien que moins nombreuses que leurs homologues françaises (400 vs 600), les pépites israéliennes de la cybersécurité ont levé 800 millions de dollars en 2017, contre 26 à leurs concurrentes [...]