Etay Maor Etay Maor is Chief Security Strategist and founding member of Cyber Threats Research Lab (CTRL) at Cato Networks, a leader of advanced cloud-native cybersecurity technologies. Previously, Etay was the Chief Security Officer for IntSights, where he led strategic cybersecurity research and security services. Etay has also held senior security positions at IBM, where he created and led breach response training and security research, and RSA Security’s Cyber Threats Research Labs, where he managed malware research and intelligence teams. Etay is an adjunct professor at Boston College and is part of Call for Paper (CFP) committees for the RSA Conference and QuBits Conference. He holds a BA in Computer Science and a MA in Counter-terrorism and Cyber-terrorism from IDC Herzliya/Reichman University.

Etay Maor

For Unbiased Evaluation, Take on Real-World Security Testing
Etay Maor | | Breach and attack simulation (BAS), cybersecurity testing, data exfiltration, lateral movement, SASE
For organizations that are evaluating security controls, independent testing offers an unvarnished assessment of integrity and performance, of effectiveness ... Read More
Security Boulevard

Making a Case for Single-Vendor SASE
Thanks to a workforce that is increasingly operating remotely and accessing applications that reside outside the corporate perimeter (i.e. cloud), businesses are lacking a scalable and secure architecture that is built around an increasingly remote, cloud-based and perimeter-less environment. What’s more, with the growing adoption of edge computing and internet-of-things ... Read More
Security Boulevard

Rise of Single-Vendor SASE and the Challenges of Integration
In 2021, just two years after Gartner introduced secure access service edge (SASE), the SASE market size was estimated to hit a whopping $3 billion. The SASE market is expected to reach the $6 billion mark by 2028. That’s a CAGR of 10.40%. The reason? Modern enterprises must extend their ... Read More
Security Boulevard

MITRE ATT&CK Framework Explained: Why it Matters
We all know that cyberthreats have become more frequent, stealthier and more sophisticated. What’s more, the traditional, reactive approach to detecting threats by hunting indicators of compromise (IoCs) using markers like IP addresses, domains and file hashes is quickly becoming outdated—threats are only detected once a compromise is achieved and ... Read More
Security Boulevard

AI-Fueled Deep Fakes Signal New Era of Cybercrime
Information manipulation has been around since Chinese general Sun Tzu wrote “The Art of War” in 550 BC. The Russians routinely use disinformation tactics to destabilize democracies. Events like the 2020 U.S. elections or COVID-19 vaccinations highlight how political opponents and rogue nations actively practice disinformation campaigns to undermine confidence ... Read More
Security Boulevard

How I was hacked by my six-year-old daughter
“Hacking is exploiting security controls either in a technical, physical or a human based element,” – Kevin Mitnick. Well, let me give you another quote “Daaaaaaaaaaaaddy, I am bored!” – my six-year-old daughter, yesterday. Here is the scene – I am working on a presentation about cyber security flaws in ... Read More