previous arrow
next arrow
Slider

Blog

By Ziv Gadot

In the cat-and-mouse game between DDoS hackers and defenders, it seems protection vendors have made great progress in the past year – particularly in the realm of application-layer attacks. Unsurprisingly, this forced hackers to scale up their attack methods. Here’s what we’ve seen in the past year or so, in

By Oren Koren

In the current landscape of frequent mergers and acquisitions, organizations face the daunting task of harmonizing cybersecurity measures across their subsidiaries. This presents a threat to the parent organization’s overall security, as the top-tier security team may lack access and knowledge about the subsidiaries’ cybersecurity infrastructure. Nonetheless, the time it

By David Ratner

Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise, analyze the incidents, add pertinent information to “deny lists”, and update stakeholders on “what happened.” But in today’s threat landscape hackers move too quickly, tactics become too sophisticated and attack vectors are too numerous for

By Mike Wilson

We’ve recently come out of another year of escalating uncertainty. The wars in Ukraine and Israel have shown no signs of ending, ensuring a volatile geopolitical landscape in 2024. Additionally, the rapid adoption of generative AI is fueling a new method of exploitation. I expect that breaches, ransomware threats, rising

By Joshua Bartholomew

The landscape of cybersecurity is witnessing a seismic shift with the advent of artificial intelligence (AI), heralding a new era of challenges and opportunities for organizations globally. As we dive deeper into 2024, AI’s role in cybersecurity has become a pivotal point of discussion, offering both innovative defenses and sophisticated

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.