
Human-Centric No-Code Automation is the Future of Cybersecurity
It’s never been more challenging to work in cybersecurity. The cost of a breach keeps going up, the number of attacks is constantly increasing and the industry is in the middle of a multi-year staffing crisis. It’s no surprise that 90% of security teams see automation as essential for them ... Read More
5 mistakes CISOs must avoid in 2019
It’s that time of year again when you’re expected to review the past year and refine your resource protection strategies to avoid a data breach. The stakes are high. There is almost nothing more frightening than having to deal with the fallout of a cyber attack ... Read More
Why Automation And APIs Should Replace User Interfaces For Enterprise IT And Security Solutions
This blog was originally published on Forbes The information technology market, according to various opinions, is evolving in cycles or waves. Each such cycle can have clear specifications on how an IT solution works, how its users interact with it, etc. Sometimes the market will see certain features, such as ... Read More
Zero Trust is the InfoSec trend of 2018: Here’s Why
The use of cloud applications and cloud-based storage have become so popular that organizations are being compelled to re-define and update their security and access strategy to protect their globally distributed digital assets from cyber attacks. The financial impact of a data breach can run into the billions, and irreversible ... Read More
How I Became A Believer In Consuming IT Security As A Service
This article was originally published in Forbes ... Read More
To Trust Or Not To Trust: That Is The Question
Information security is a field that has received a lot of attention in recent years from theoreticians and practitioners alike. Coming from an IT network security practitioner background over the last 15 years, I am always on the hunt for new ideas, particularly when it comes to innovating in the ... Read More

Zero Day protection of SSH Servers with Zero Trust Access
On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh. Background The vulnerability originated from a specific implementation of an authentication state machine, that is shared between the client and the server, and allows maliciously-implemented clients to bypass the required ... Read More