figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Results for: Laptop

slider item
Your Innovation Feed
5+4 = The New Cloud Security Stack
Eli Arkush 09.06.21

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]

Read more
slider item
Zero Trust Access Management
Adapting Security to Work Anywhere
Guest Writer 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management
Why Phishing Attacks Increase on Holiday Seasons
Guest Writer

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more
slider item
Identity & Access Management (IAM)
Automated Workflows – IT & HR Dreams Come True
Eli Arkush 25.05.21

At times when interest rates are close to zero and VC money flows into startups and tech companies, we see a spike in the recruitment pace of talented knowledge workers. The competition for software engineers, developers, DevOps, SREs, and security engineers is fierce. Therefore, companies put lots of effort into optimizing their employee experience, also […]

Read more
slider item
Kubernetes Cluster Management
Kubeflow: Concepts, Use Cases and Starter’s Guide
Admin Globaldots 17.03.21

In this blog, I am going to cover the basics of Kuberflow, its use cases, and installation procedure.

Read more
slider item
What is Credential Stuffing?
Dror Arie 09.07.20

Credential stuffing is a type of cyberattack where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application.

In this article, we explain how credential stuffing attacks work and how you can protect yourself against them.

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify | Cloud Security Reimagined