The world of technology is an ever changing one with cybersecurity being the epitome of that. Cybersecurity is an area in which the inability to adapt to change has visible and almost immediate negative consequences. It is because of this that even though it is hard...
User Security
The AI solution to rising cybersecurity threats
According to the World Economic Forum Global Risks Report 2021, cybersecurity failure was rated alongside extreme weather, climate action failure and human-led environmental damage as one of the risks with the highest likelihood. Cybercrime researcher Cybersecurity...
Cybersecurity and the impact of working from home
At the issuance of lockdown orders, working from home largely sounded like heaven for most employees and even companies as they saw the opportunity to work on largely their own terms while saving on various overheads. This joy however overlooked the ever existing...
To VPN or Not to VPN?
Over the past few years, VPN vulnerabilities have been in the spotlight and talked about everywhere. There is always some vulnerability being abused by opportunists and criminals, but VPNs still remain the majority solution of choice for remote access across the...
Zero Trust Architecture: Best Practices for Safer Networks
A zero trust architecture enables organizations to prioritize access and restrictions. The goal is to implement a zero trust policy across all traffic, to ensure no user, device, or system can put the network at risk. Zero trust architectures typically enforce three...
Multi-factor authentication offers effective security, but not all solutions are created equal
Reports published by Proofpoint recently documenting MFA vulnerabilities in Microsoft 365 (Office 365) have likely caused concern among Microsoft customers. The report cites “critical vulnerabilities in multi-factor authentication (MFA) implementation in cloud...
Increase SSO security by going passwordless
The acceleration of digital transformation initiatives to support the remote workforce has, in turn, sped up the development of cloud-based applications. An average employee uses 36 cloud services at work according to McAfee, and accessing those applications requires...
5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console
Over the next few weeks, we’ll explore best practices for securing privileged accounts and identities in common cloud scenarios. This series can help guide effective risk reduction strategies for today and for the future as cloud workloads evolve. First up, we’re...
AI email security: Understanding the human behind the keyboard
At the heart of any email attack is the goal of moving the recipient to engage: whether that’s clicking a link, filling in a form, or opening an attachment. And with over nine in ten cyber-attacks starting with an email, this attack vector continues to prove...
Notice the unnoticed: Threat Hunting by SandBlast Agent
By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involves searching for indicators of compromise (IoC), investigating, classifying, and remediate. Threat hunting can be...