figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Results for: email service provider

slider item
Zero Trust Access Management

Adapting Security to Work Anywhere

Guest Writer 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management

Why Phishing Attacks Increase on Holiday Seasons

Guest Writer

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more
slider item
Compliance Automation

Cloud Compliance 101

Guest Writer 30.05.21

InfoSec Compliance is a big word, involving most systems in your working environment, and multiple deliverables to be produced for the auditing team. Up till today, this project was as complex as can be. Today, with the introduction of Compliance Automation Platforms, things get simpler. Here’s a list of what you need (and don’t need […]

Read more
slider item
Compliance Automation

Life Is A Checklist of Checklists

Guest Writer

Daily Chaos, By Design We all know how security compliance works. It’s one of those processes no one dares to disrupt. As InfoSec leaders, after having our morning coffee, we quickly move to our emails, going through those routinely generated reports, which leads us to believe that the procedures and controls are still in place […]

Read more
slider item
Compliance Automation

Startup-Speed Products with Enterprise Grade Compliance

Eli Arkush 25.05.21

Let’s face it – Security compliance is a hassle. (Almost) nobody likes it, it’s boring and perceived as a tedious checklist that must be completed in order to achieve the prestigious mark of being “XYZ” compliant. Why is that, and how can we better tackle this challenge? The Compliance Challenge Companies need compliance mainly for 2 […]

Read more
slider item

Attackers Have Created a Specialized Economy Around Email Account Takeover

Dror Arie 27.07.20

Attackers Have Created a Specialized Economy Around Email Account Takeover

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure