230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)
03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

blog1
26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

blog1

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

vulnerability-sq
27 May 2019 • Yiftach Keshet

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

May 12th marked the second anniversary of one of the most globally devastating cyberattacks in history, known as WannaCry. As […]

27 May 2019 • Yiftach Keshet

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

vulnerability-sq

May 12th marked the second anniversary of one of the most globally devastating cyberattacks in history, known as WannaCry. As […]

square
13 May 2019 • Yiftach Keshet

Cynet Insights on Gartner’s Top 10 Security Projects for 2019

When it comes to security, prioritization is often the most used word. With an ever-increasing number of threats matched by […]

13 May 2019 • Yiftach Keshet

Cynet Insights on Gartner’s Top 10 Security Projects for 2019

square

When it comes to security, prioritization is often the most used word. With an ever-increasing number of threats matched by […]

wade-blog-3
29 Apr 2019 • Wade P. Richmond

5 Tips To Help Small to Mid-Sized Businesses Improve Cybersecurity

Cybersecurity threats need to be taken more seriously by businesses of all sizes. Security breaches and attacks are becoming more […]

29 Apr 2019 • Wade P. Richmond

5 Tips To Help Small to Mid-Sized Businesses Improve Cybersecurity

wade-blog-3

Cybersecurity threats need to be taken more seriously by businesses of all sizes. Security breaches and attacks are becoming more […]

Main image
02 Apr 2019 • Yiftach Keshet

Free Threat Assessment Offering for Mid-Sized and Large Organizations

Know Your Risk Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the […]

02 Apr 2019 • Yiftach Keshet

Free Threat Assessment Offering for Mid-Sized and Large Organizations

Main image

Know Your Risk Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the […]

Crossroad signpost saying this way, that way, the other way concept for lost, confusion or decisions
26 Mar 2019 • Yiftach Keshet

Reflections on Consolidation Trends – Go Shopping or Go Native

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cybersecurity industry. It seems as […]

26 Mar 2019 • Yiftach Keshet

Reflections on Consolidation Trends – Go Shopping or Go Native

Crossroad signpost saying this way, that way, the other way concept for lost, confusion or decisions

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cybersecurity industry. It seems as […]

switch cynet blog 304X200 (002)
20 Mar 2019 • Yiftach Keshet

Refund and Replace with Cynet Security Platform

Rip Refund and Replace with Cynet Security Platform The Hunt for Advanced Threat Protection It’s a common flow. You recognize […]

20 Mar 2019 • Yiftach Keshet

Refund and Replace with Cynet Security Platform

switch cynet blog 304X200 (002)

Rip Refund and Replace with Cynet Security Platform The Hunt for Advanced Threat Protection It’s a common flow. You recognize […]

PCI Blog 2
05 Mar 2019 • Wade P. Richmond

5 Steps to Achieving PCI Compliance

Achieving PCI compliance can be a difficult yet extremely important task for all businesses involved in data  storage and protection. […]

05 Mar 2019 • Wade P. Richmond

5 Steps to Achieving PCI Compliance

PCI Blog 2

Achieving PCI compliance can be a difficult yet extremely important task for all businesses involved in data  storage and protection. […]

resource page-How to Understand and Proactively Confront the Modern Threat Landscape-02 (002)
15 Jan 2019 • Inbal Aharoni

How to Secure Your Mid-Sized Organization from the Next Cyber Attack

If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to […]

15 Jan 2019 • Inbal Aharoni

How to Secure Your Mid-Sized Organization from the Next Cyber Attack

resource page-How to Understand and Proactively Confront the Modern Threat Landscape-02 (002)

If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to […]

whitepaper-stopping-ransomware-lpg
08 Jan 2019 • Eyal Gruner

Securing Your Organization's Network on a Shoestring

In this blog post, we will discuss how to protect your resource-constrained organization’s endpoints, networks, files and users without going […]

08 Jan 2019 • Eyal Gruner

Securing Your Organization's Network on a Shoestring

whitepaper-stopping-ransomware-lpg

In this blog post, we will discuss how to protect your resource-constrained organization’s endpoints, networks, files and users without going […]

RESOURCE PAGE-EBOOK-Self-Audit (002)
03 Jan 2019 • Eyal Gruner

Self-Audit Guide: Cybersecurity Effectiveness for the Resource-Constrained Organization

A Primer for Moving Beyond AV and Firewalls: The Problem – As software systems become more distributed and interactive with […]

03 Jan 2019 • Eyal Gruner

Self-Audit Guide: Cybersecurity Effectiveness for the Resource-Constrained Organization

RESOURCE PAGE-EBOOK-Self-Audit (002)

A Primer for Moving Beyond AV and Firewalls: The Problem – As software systems become more distributed and interactive with […]

DnsTunneling
22 Oct 2018 • Ron Lifinski

How Hackers Use DNS Tunneling to Own Your Network

By: Ron Lifinski, Cyber Security Researcher Most organizations have a firewall that acts as a filter between their sensitive internal […]

22 Oct 2018 • Ron Lifinski

How Hackers Use DNS Tunneling to Own Your Network

DnsTunneling

By: Ron Lifinski, Cyber Security Researcher Most organizations have a firewall that acts as a filter between their sensitive internal […]

Threat Intell.png
24 May 2018 • Shai Gabay

Making Threat Intelligence Work for You

As cyber attacks and threats have grown more complex, our knowledge of them has increased as well. As security professionals […]

24 May 2018 • Shai Gabay

Making Threat Intelligence Work for You

Threat Intell.png

As cyber attacks and threats have grown more complex, our knowledge of them has increased as well. As security professionals […]

Proactive Security Through Threat Hunting_Part 2 _1200x627
17 May 2018 • Shai Gabay

Proactive Security through Threat Hunting - Part 2

In part one of our series on taking a proactive approach to cyber security, we discussed the idea of active […]

17 May 2018 • Shai Gabay

Proactive Security through Threat Hunting - Part 2

Proactive Security Through Threat Hunting_Part 2 _1200x627

In part one of our series on taking a proactive approach to cyber security, we discussed the idea of active […]