
Why Do I Need SOAR, If I Have SIEM?
The ever-growing Cyber Security Threat Landscape is becoming a challenge to Organizations to detect and respond quickly to threats and minimize the effect of security incidents. “Cyber-attacks can ge…
Tags:cybercyberattackcybersecurity
The ever-growing Cyber Security Threat Landscape is becoming a challenge to Organizations to detect and respond quickly to threats and minimize the effect of security incidents. “Cyber-attacks can ge…
Tags:cybercyberattackcybersecurity
Using Machine Learning (ML) and Artificial Intelligence (AI) to address Cyber Security challenges: As is the industry trend, ML and AI are inevitable courses of action to be undertaken by most tec…
Cloud adoption is growing faster than ever before, with new customers building their infrastructure from the ground-up, or existing customers scaling up their cloud presence significantly. Moving to t…
Last year data privacy regulators dived deep into investigating organizations that were breached or exposed customer data. The key finding in most of the cases was that failed Cyber Security protocols…
Tags:Cyber SecurityDLPEndpoint
Introduction Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discovering that a traditional security approach wi…
Tags:Cloud ComputingCyber SecurityCyber Security Training
Work environments now a days are more dynamic than ever before, which makes it hard for those who are still using the traditional tools. Cloud environments are increasingly popular as it offers great …
Tags:Cloud Computingcoffee minercyber attacks
"Free Wi-Fi” – the notice declares. Weary shoppers throng into the coffee shop, drawn by the prospects of Internet access at no cost whilst, perhaps, enjoying a warm cuppa with some cake. Public Wi-Fi…
Tags:AIArtificial IntelligenceBitdefender
“I’m a Data Scientist”. Fundamental to the field of Artificial Intelligence, Data Scientists are skilled at developing or exploiting mathematical tools to examine troves of data and extract meaningful…
Tags:cyber attackcyber attackscyber insurance
Cyber insurance is a product used to protect businesses and individual users from cyber risks. It was designed to help an organization mitigate risk of exposure by offsetting costs required during rec…
Tags:20182018 predictionsCloud Computing
Digital Transformation is on the radar of every ambitious company in almost every industry. Driven by the opportunity companies embark on their Digital Transformation journey and often miss or neglect…