3 business application security risks businesses need to prepare for in 2023

Ransomware has lately been the primary method of monetization for threat actors. Still, research has revealed a slight decrease in ransomware attacks and ransomware payments this past year, suggesting cybercriminals are evolving their strategies. Threat actors have been leveraging more discreet techniques to make a profit by directly targeting an enterprise’s crown jewels—enterprise resource planning […]

Continue Reading

Chinese researchers: RSA is breakable. Others: Do not panic!

Quantum computing poses a great opportunity but also a great threat to internet security; certain mathematical problems that form the basis of today’s most popular cryptographic algorithms will be much easier to solve with quantum than with “classical” computers. Recently, Chinese researchers have claimed that an existing algorithm can be used with today’s quantum computers […]

Continue Reading

The loneliness of leading a cybersecurity startup

Linor spends her days working with cybersecurity founders at her Venture Capital firm. Gaining insight into their experiences over the course of building these relationships and supporting the brick-laying of their visions, she shares observations on the tough – and often undiscussed –impact their startup journey has on emotional wellness and self-care. The world of […]

Continue Reading

Zero trust network access for Desktop as a Service

When you support a remote workforce, you risk opening your data, applications, and organization to the world. How can you sleep soundly at night while enabling a modern “work from anywhere” workforce? Acknowledging the inherited security challenges in remote access is a good place to start. From there, design your Desktop as a Service (DaaS) […]

Continue Reading

Why encrypting emails isn’t as simple as it sounds

The quality of protected communications matters – a lot. If the sent material is highly sensitive and the legislation and/or policy demands high security, opportunistic encryption might not be enough. For organizations, deciding what email encryption solution to use is often not so simple and, generally speaking, there is no single correct answer. Here we […]

Continue Reading