230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)
03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

blog1
26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

blog1

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

451
18 Apr 2019 • Inbal Aharoni

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform

The Cynet 360 platform is the subject of a new analyst review put out by 451 Research, “Cynet aims to […]

18 Apr 2019 • Inbal Aharoni

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform

451

The Cynet 360 platform is the subject of a new analyst review put out by 451 Research, “Cynet aims to […]

Crossroad signpost saying this way, that way, the other way concept for lost, confusion or decisions
26 Mar 2019 • Yiftach Keshet

Reflections on Consolidation Trends – Go Shopping or Go Native

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cybersecurity industry. It seems as […]

26 Mar 2019 • Yiftach Keshet

Reflections on Consolidation Trends – Go Shopping or Go Native

Crossroad signpost saying this way, that way, the other way concept for lost, confusion or decisions

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cybersecurity industry. It seems as […]

ma (002)
18 Mar 2019 • Yiftach Keshet

Reflections on M&A Cybersecurity Issues

The latest testimonial on the Marriot data breach throws another spotlight on the security risks M&A activity entails. As it […]

18 Mar 2019 • Yiftach Keshet

Reflections on M&A Cybersecurity Issues

ma (002)

The latest testimonial on the Marriot data breach throws another spotlight on the security risks M&A activity entails. As it […]

The-good-the-bad
07 May 2018 • Inbal Aharoni

The Good & the Bad of the Cyber Hack - Part 1

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka the Kevin Mitnicks […]

07 May 2018 • Inbal Aharoni

The Good & the Bad of the Cyber Hack - Part 1

The-good-the-bad

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka the Kevin Mitnicks […]

Machine-Learning
29 Apr 2018 • Inbal Aharoni

Machine Learning, Artificial Intelligence & Security

Our lives are more and more Mister Robot, and the industries which surround our lives are increasingly integrating Machine Learning […]

29 Apr 2018 • Inbal Aharoni

Machine Learning, Artificial Intelligence & Security

Machine-Learning

Our lives are more and more Mister Robot, and the industries which surround our lives are increasingly integrating Machine Learning […]

BYOD
16 Apr 2018 • Dori Harpaz

BYOD & the Weakest Link

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore, […]

16 Apr 2018 • Dori Harpaz

BYOD & the Weakest Link

BYOD

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore, […]

The-evolution-of-the-attack
08 Apr 2018 • Inbal Aharoni

The Evolution of the Attack Kill Chain

Born of Necessity Way back in 2011, Lockheed Martin introduced the cyber attack kill chain to the world. It was […]

08 Apr 2018 • Inbal Aharoni

The Evolution of the Attack Kill Chain

The-evolution-of-the-attack

Born of Necessity Way back in 2011, Lockheed Martin introduced the cyber attack kill chain to the world. It was […]

Big-Data
01 Apr 2018 • Inbal Aharoni

Can Big Data Ever Be Secure?

Big Data makes for big headlines. We talk about everything from its applications – with more and more companies using […]

01 Apr 2018 • Inbal Aharoni

Can Big Data Ever Be Secure?

Big-Data

Big Data makes for big headlines. We talk about everything from its applications – with more and more companies using […]

Uber 1200x627 1
22 Nov 2017 • Dori Harpaz

Cynet’s Response to Uber’s Extortion Payment

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breach impacting 57-million […]

22 Nov 2017 • Dori Harpaz

Cynet’s Response to Uber’s Extortion Payment

Uber 1200x627 1

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breach impacting 57-million […]

2017 rware 3 screens
09 Nov 2017 • Dori Harpaz

The Year of Ransomware

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size being impacted, shelling out millions of dollars […]

09 Nov 2017 • Dori Harpaz

The Year of Ransomware

2017 rware 3 screens

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size being impacted, shelling out millions of dollars […]

Ransomware Nightmare
31 Oct 2017 • Inbal Aharoni

2017: The Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted Europe and scarred institutions and […]

31 Oct 2017 • Inbal Aharoni

2017: The Ransomware Nightmare

Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted Europe and scarred institutions and […]

bank ny dfs
06 Sep 2017 • Inbal Aharoni

New York's Strict New Cyber Regulations: Just the Beginning

All eyes are on New York state as they institute the nation’s first of its kind cyber security oversight for […]

06 Sep 2017 • Inbal Aharoni

New York's Strict New Cyber Regulations: Just the Beginning

bank ny dfs

All eyes are on New York state as they institute the nation’s first of its kind cyber security oversight for […]

Lego2
22 Aug 2017 • Inbal Aharoni

Multiple Security Vendors… A Recipe for Disaster

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions to handle boutique attacks and unique […]

22 Aug 2017 • Inbal Aharoni

Multiple Security Vendors… A Recipe for Disaster

Lego2

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions to handle boutique attacks and unique […]

Münster, Germany - November 24, 2013:
10 Aug 2017 • Inbal Aharoni

The Black-and-White of Black & White Hat-ers

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered around a computer, trying to […]

10 Aug 2017 • Inbal Aharoni

The Black-and-White of Black & White Hat-ers

Münster, Germany - November 24, 2013:

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered around a computer, trying to […]

Blog Subjects.docx
30 Jul 2017 • Dori Harpaz

Living the CISO’s Nightmare? Simplify Your Security

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evolving. Keeping up is never easy. […]

30 Jul 2017 • Dori Harpaz

Living the CISO’s Nightmare? Simplify Your Security

Blog Subjects.docx

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evolving. Keeping up is never easy. […]

Münster, Germany - November 24, 2013:
23 Jul 2017 • Dori Harpaz

Healthcare Breaches – the Tip of the Cyber-Iceberg

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the cyber-iceberg. We are […]

23 Jul 2017 • Dori Harpaz

Healthcare Breaches – the Tip of the Cyber-Iceberg

Münster, Germany - November 24, 2013:

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the cyber-iceberg. We are […]

Final Threats infographic V8-01
05 Jul 2017 • Dori Harpaz

Ransomware is Getting Faster – Is Your Security Keeping Up?

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that has security professionals […]

05 Jul 2017 • Dori Harpaz

Ransomware is Getting Faster – Is Your Security Keeping Up?

Final Threats infographic V8-01

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that has security professionals […]

Lawyers_big
14 Jun 2017 • Dori Harpaz

Are Law Firms the Next Victims of Ransomware Bad Guys?

14 Jun 2017 • Dori Harpaz

Are Law Firms the Next Victims of Ransomware Bad Guys?

Lawyers_big

ciso blog
06 Jun 2017 • Inbal Aharoni

The IT Security Double Whammy

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security Solutions Cybersecurity is about preventing, detecting and […]

06 Jun 2017 • Inbal Aharoni

The IT Security Double Whammy

ciso blog

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security Solutions Cybersecurity is about preventing, detecting and […]

Wannacry Banner blog
18 May 2017 • Inbal Aharoni

Ransomware Breaks the Bank – Depending on How You Look at It

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe have shifted their focus from […]

18 May 2017 • Inbal Aharoni

Ransomware Breaks the Bank – Depending on How You Look at It

Wannacry Banner blog

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe have shifted their focus from […]