Sign up to our Newsletter
Explore our full library
What is the most annoying thing about compliance work? Out of 150 security leaders surveyed on Pulse, 41% pointed out their struggle for cooperation from core teams in producing evidence needed for InfoSec audits. In other words, compliance work is ungrateful and unpopular. Cloud compliance in hyper-growth companies poses a significant challenge in terms of […]
In a world of quickly-expanding cloud traffic, SASE has emerged as the clear choice for ensuring a proactive security posture and consistent protection against emerging cloud-native threats. SASE also gains popularity for converging security and speed – a potent combination which helps realize the potential of the cloud. Read more in our guide “How to […]
Which is more important: security or speed? This question has long been a source of concern for businesses worldwide, and it can leave many organizations vulnerable to hacks in the name of doing things fast and improving employee work experience. Starting today, to foster corporate security and growth, you do not need to compromise your […]
The recent global DNS outages, with the latest addition of Facebook-Instagram-WhatsApp, are a call to transform your approach to DNS solutions. In this webinar, we explore whether cloud-borne environments are really fail-proof and how businesses can use the most advanced cybersecurity methods and DNS solutions to minimize their risk of server failures, code misconfigurations, DDoS […]
Last week’s massive outage on the Facebook-Instagram-WhatsApp ecosystem left many of us puzzled and concerned: How did our entire social communication (and news source for many) become so dependent in a single, non-regulated conglomerate? How come this conglomerate can fail over a seemingly-trivial reason such as DNS? And what are the dangers of our over-reliance […]
The real big winners of eCommerce surge 2020 saw the largest year-over-year growth in eCommerce sales. Throughout this growth, fraudsters continued to develop sophisticated attacks to fill their pockets. One of the most devastating attack types is automated fraud: bots that mimic the actions of a real customer so they can bypass fraud prevention tools. […]
Which is more important to your business, security or speed? This has long troubled business owners worldwide and can leave many companies vulnerable to cyberattacks in a bid to optimize user experience. But you don’t need to compromise your level of enterprise security to nurture business growth. Until today, IT security often created roadblocks for […]
HR professionals usually agree that proper employee onboarding is a 90-day process. Stats mentioning 7 days are therefore responded to with horror, or at least great concern. But, a great deal of employee onboarding – namely the IT part of it – can actually be automated. Imagine account provisioning by role and team rolling out […]
Passwords are obsolete. Memorizing long and complicated passwords has been holding back businesses for over 50 years, while cyberattacks are evolving every day. ¹ In fact, Google has registered over 2 million phishing sites as of January 2021. The figure is up from 1.7 million in January 2020, a 27% increase year on year. ² […]
Returning from my vacation abroad, I had to fill out a COVID declaration form on the Israeli Health Ministry website. Something looked weird when I filled it out on my mobile: It was too quick to indicate that I’m vaccinated, and this output came up even with a typo in my passport number. Hence I […]
Last week, a researcher named RyotaK shared a clever supply chain vulnerability in Cloudflare’s highly popular hosted module called cdnjs, which runs on around 12% of all sites on the web. The module helps developers consume other popular packages and integrate them safely into their sites. The vulnerability was in the cdnjs library update server […]
Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]
In this article I hope to give the reader a small history lesson as well as some advice on how to build a useful monitoring system for your platform. First, it’s key to understand where we came from. Before cloud computing systems, every company owned its own infrastructure and therefore had a need to monitor […]
Sign up to our Newsletter
Download the Full Report
Book a Demo