How do you protect your IoT devices from exploitation?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From [...]

Did you just create a paradise for hackers?

Why Shadow IT is the oxygen for APTs &  how to contain it? 1st post in series highlighting real life APT attacks examples.  By Shai Mendel, Team leader at XM Cyber Ah, shadow IT errors; so [...]

RSA Conference 2018 Takeaways

Trends, technologies and talking points As the RSA conference draws to a close, we’re looking back with red-shot eyes, at the week that was. RSA has evolved from a small cryptography conference [...]