figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

Explore our full library

slider item
Compliance Automation

How to Free Yourself (and Core Teams) from Ungrateful Compliance Work

Dror Arie 08.11.21

What is the most annoying thing about compliance work? Out of 150 security leaders surveyed on Pulse, 41% pointed out their struggle for cooperation from core teams in producing evidence needed for InfoSec audits. In other words, compliance work is ungrateful and unpopular. Cloud compliance in hyper-growth companies poses a significant challenge in terms of […]

Read more
slider item
SD-WAN and SASE

SASE vs. Zero Trust: Your Definitive Guide

Gershon Tchemakin 31.10.21

In a world of quickly-expanding cloud traffic, SASE has emerged as the clear choice for ensuring a proactive security posture and consistent protection against emerging cloud-native threats. SASE also gains popularity for converging security and speed – a potent combination which helps realize the potential of the cloud. Read more in our guide “How to […]

Read more
slider item
Your Innovation Feed

Hear It From 3 Security Leaders: How Security Can Accelerate Business

Dror Arie 18.10.21

Which is more important: security or speed? This question has long been a source of concern for businesses worldwide, and it can leave many organizations vulnerable to hacks in the name of doing things fast and improving employee work experience.  Starting today, to foster corporate security and growth, you do not need to compromise your […]

Read more
slider item
Managed DNS

Downtime is Pricy, Solution isn’t: How to Stay Out of DNS Outages

Francesco Altomare 13.10.21

The recent global DNS outages, with the latest addition of Facebook-Instagram-WhatsApp, are a call to transform your approach to DNS solutions. In this webinar, we explore whether cloud-borne environments are really fail-proof and how businesses can use the most advanced cybersecurity methods and DNS solutions to minimize their risk of server failures, code misconfigurations, DDoS […]

Read more
slider item
Managed DNS

Facebook Will Happen Again: DNS Outages and Interconnected Systems

Francesco Altomare 11.10.21

Last week’s massive outage on the Facebook-Instagram-WhatsApp ecosystem left many of us puzzled and concerned: How did our entire social communication (and news source for many) become so dependent in a single, non-regulated conglomerate? How come this conglomerate can fail over a seemingly-trivial reason such as DNS? And what are the dangers of our over-reliance […]

Read more
slider item
Bot Mitigation & Anti-Fraud

Defending eCommerce from Bots… Without Dissing Your Customers

Dr. Eduardo Rocha 22.09.21

The real big winners of eCommerce surge 2020 saw the largest year-over-year growth in eCommerce sales. Throughout this growth, fraudsters continued to develop sophisticated attacks to fill their pockets. One of the most devastating attack types is automated fraud: bots that mimic the actions of a real customer so they can bypass fraud prevention tools. […]

Read more
slider item
Your Innovation Feed

Redefining Cloud Security to Accelerate Business

Dror Arie

Which is more important to your business, security or speed? This has long troubled business owners worldwide and can leave many companies vulnerable to cyberattacks in a bid to optimize user experience. But you don’t need to compromise your level of enterprise security to nurture business growth. Until today, IT security often created roadblocks for […]

Read more
slider item
Identity & Access Management (IAM)

Automating Hypergrowth with Okta: The Pagaya Case Study

Dror Arie 12.09.21

HR professionals usually agree that proper employee onboarding is a 90-day process. Stats mentioning 7 days are therefore responded to with horror, or at least great concern. But, a great deal of employee onboarding – namely the IT part of it – can actually be automated. Imagine account provisioning by role and team rolling out […]

Read more
slider item
Identity & Access Management (IAM)

The good, the good-old and the biometric: 5 Passwordless options compared

Dror Arie 25.08.21

Passwords are obsolete. Memorizing long and complicated passwords has been holding back businesses for over 50 years, while cyberattacks are evolving every day. ¹ In fact, Google has registered over 2 million phishing sites as of January 2021. The figure is up from 1.7 million in January 2020, a 27% increase year on year. ² […]

Read more
slider item
API Security

API Vulnerability Exposes COVID Vaccination Status of All Israeli Citizens

Dror Arie 17.08.21

Returning from my vacation abroad, I had to fill out a COVID declaration form on the Israeli Health Ministry website. Something looked weird when I filled it out on my mobile: It was too quick to indicate that I’m vaccinated, and this output came up even with a typo in my passport number. Hence I […]

Read more
slider item
Supply-Chain Data Protection

RCE in Cdnjs and What It Means to You

Francesco Altomare 19.07.21

Last week, a researcher named RyotaK shared a clever supply chain vulnerability in Cloudflare’s highly popular hosted module called cdnjs, which runs on around 12% of all sites on the web. The module helps developers consume other popular packages and integrate them safely into their sites.  The vulnerability was in the cdnjs library update server […]

Read more
slider item
Your Innovation Feed

5+4 = The New Cloud Security Stack

Eli Arkush 09.06.21

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]

Read more
slider item
Monitoring, Logging & Observability

Old Approaches to Monitor a New World: Monitoring in the Hybrid Cloud

Manuel Reischl

In this article I hope to give the reader a small history lesson as well as some advice on how to build a useful monitoring system for your platform. First, it’s key to understand where we came from. Before cloud computing systems, every company owned its own infrastructure and therefore had a need to monitor […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure