Cyber Security News

You Be The Hero. We've Got Your Back!

A better way to stop Malicious Code

The battle against targeted attacks and zero-day-based threats infiltrating the network is an age-old one. It’s true that huge investments have been made in developing new technologies and “advanced-threat protection” solutions, such as sand-boxing and user-behavior analysis, to fight this battle. However, it is still very clear who’s who in the cat-and-mouse game of cyber […]

Read More…

Why Penetration Testing For Insurance, Health, and Finance…

Penetration testing provides an excellent overview of the security state of your environment as well as the organization. This is a big deal, among organization such as insurance, medical, and finance that wants to protect their business. Penetration testing highlight what a real-world bad guy might see if he or she targeted the given organization. […]

Read More…

The Value of Continuous Penetration Testing

From year to year, cyber-attacks represent the highest growing threat in terms of mitigation costs, and as a result, annual cyber security budgets continue to increase. Yet, companies still don’t know if they are sufficiently protected as hackers continue to find vulnerabilities and break into their networks despite their sophisticated firewalls and anti-virus systems. Penetration […]

Read More…

IT leaders must focus on detecting and responding to threats

IT leaders must focus on detecting and responding to threats, as well as more traditional blocking and other measures to prevent attacks. Application self-protection, as well as user and entity behavior analytics, will help fulfill the adaptive security architecture. These days, most security professionals would concede that their networks have become more vulnerable, given the […]

Read More…

Commercialization of Cyber-crime and what it means to your organization

Cyber-crime is fast becoming a full-fledged commercial industry, operating very much like the software and IT services industry. This was not always the case. Since the early days of the Internet, cyber-criminals were perceived as individuals, working in dark basements at night, and only communicating with others like them when needing to exchange information. They were […]

Read More…

WHO WE ARE

Because of the increasing number of data breaches, and the increasing amount of attention being paid to them, governments and companies around the globe are tightening compliance and security requirements. After 25 years in the secure messaging industry as a fax centric company, we as a group of companies found the ever increasing need for […]

Read More…

Coca-Cola secures its files and data exchange with Safe-T

Coca-Cola secured its files and data exchange with Safe-T’s Safe-T Secure Email solution Safe-T Box Secure Data Exchange Platform a comprehensive solution for securing files and data, in compliance with strict regulatory requirements. The Challenge Every day, huge numbers of messages pass through Coca-Cola’s mail servers, much of it being sensitive in nature. But all […]

Read More…

Paving the Path to Secure Data Access with Shield-SDA

Recent researches show that six out of ten organizations around the globe have suffered at least one Cyber-attack incident on their networks, applications, websites, critical infrastructures, mobile, etc. The common practice in organizations is to deploy defense layers acting as “walls” and “gates” protecting from intrusions to their internal networks. These defense layers include DMZ […]

Read More…

The 360 Degree Approach to Cyber Security

Two trends in particular are driving the new evolution of cyber security for businesses. First, the increasing digitalization of processes and businesses is happening at a breakneck pace.  A cyber-security incident isn’t just something that causes extra hours in a company’s IT department. IT powers business engines along the whole value chain, and a single […]

Read More…

Top