

Matias Katz
CEO /*=$expert->feature_status*/ ?>
Byos
Comments Dotted :
3
June 01, 2020
Some basic steps businesses can take to protect themselves against cyber threats.
There are often dozens of unmanaged devices connecting to our home networks: personal laptops, cellphones, gaming consoles, and home IoT. Any of these devices represent an entry point for attackers; once they've compromised an edge device, chances are high this compromise will spread laterally throughout the home network. And once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or.....Read More

May 21, 2020
Malware and lateral network movement, exploits and brute force attacks are common threats.
The idea of the corporate perimeter has vanished overnight and the security technologies used to protect the central corporate network have become somewhat obsolete - employees are connecting from their home, meaning they are accessing corporate resources from untrusted, insecure Wi-Fi networks. The shift to a perimeter-less, Zero Trust security strategy has been accelerated out of necessity, which would fall in line with the increased spending prediction. Organizations are forced to adapt to.....Read More

March 23, 2020
This is the concept behind hardware-enforced isolation.
It’s worth remembering that if devices are micro-segmented, attackers cannot gain remote access to it because the device itself would not be discoverable in the network, therefore making it invisible. This is the concept behind hardware-enforced isolation - no device should be exposed to the network without an extra hardware layer of protection, eliminating the possibility of attackers using vulnerabilities found inside of the host device.
