
Attack Surface Management Vs. Vulnerability Management
Cybersecurity is full of acronyms. So many, in fact, that I would be hard-pressed to find someone who knows what they all stand for or clearly explain the subtle differences between many of them. Let’s not forget to mention the cybersecurity industry is still evolving at a quick pace, meaning ... Read More

How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices ... Read More
Why Operating Systems Virtualization Is The Future of Security
Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate ... Read More
Why I Joined Hysolate
I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating ... Read More