Our latest blog posts
What is Infrastructure Monitoring and How Does It Work? Q/A with LogicMonitor
Cloud computing offers many benefits over traditional data centers, so widespread adoption is an easy choice for many enterprises. However, there are some inherent security challenges that come with the cloud. In fact, cloud compu...
Remote Work And Cybersecurity: Q/A With Egnyte
Today’s work environment requires a lot of data sharing, which leads to an obvious increased risk of content theft, like the recent data leak that happened to PegasusEFB.
Businesses embracing smart working keep finding new ways...
Q&A With GK8
Safety Detectives: Please share your company background, how you got started, and your mission.
GK8: GK8 was founded by elite Israeli cyber intelligence veterans who previously protected the nation’s strategic assets, reporting...
Interview With Adrian Furtuna – Pentest-Tools
With thanks to Adrian Furtuna, Founder and CEO of Pentest-Tools.com, Aviva Zacks of Safety Detective found out why he was his company's first customer.
Safety Detectives: What motivated you to start Pentest-Tools.com?
Adrian...
Interview With Reinard Mortlock – Livex
Aviva Zacks of Safety Detective had a wonderful time interviewing Reinard Mortlock, CEO of Livex. She found out how his company is helping keep South Africa safe from hackers.
Safety Detective: What got you interested in cybers...
Cyber Insurance Made Easy: Q/A With Asaf Lifshitz Of Sayata
Cyber threats are a problem for businesses of all sizes, but they can be particularly dangerous for small businesses that are not always able to cover the losses caused by cyberattacks.
Moreover, large Fortune companies can aff...
Security Information and Event Management (SIEM): Q/A with LogRhythm
Cyber-attacks are on the rise and so is the resulting damage, and no one is 100% safe from, as attackers are constantly improving their schemes and tools.
All kinds of organizations are implementing several different cybersecur...
Phishing Attacks: A Survival Guide by Cofense
Hackers are continuously coming up with new forms of malicious emails and schemes, so even using antivirus software with phishing protection is not enough to save you from losing sensitive information, like bank accounts credentia...
Protect Your Online Identity With These Expert Tips By Idenhaus Consulting
It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk
In fact, organizations embracing digital transfor...
How To Build Secure Mobile Applications: Expert Tips by Security Compass
In the era of mobile communication, application security is a priority that developers simply can’t ignore, if they want to avoid losing money (a LOT of money) and trust from their customers.
Therefore, every software company m...