Microsoft Storm-1152 fake accounts CaaS

Attack Surface Management Vs. Vulnerability Management

Cybersecurity is full of acronyms. So many, in fact, that I would be hard-pressed to find someone who knows what they all stand for or clearly explain the subtle differences between many of them. Let’s not forget to mention the cybersecurity industry is still evolving at a quick pace, meaning ... Read More
Security Boulevard
How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce

How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce

| | byod, BYOPC, daas, Endpoint security, vdi
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices ... Read More

Why Operating Systems Virtualization Is The Future of Security

| | Virtualization
Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate ... Read More

Why I Joined Hysolate

I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating ... Read More