Estimated reading time: 2 minutes So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately, everyone is talking about the new HBO miniseries, Chernobyl, portraying one of the biggest man-made disasters which happened 33 years ago near a small city of Pripyat. Chernobyl was an RBMK type nuclear power plant Read more about Chernobyl disaster main lessons for CyberOps in 2019[…]
Estimated reading time: 3 minutes Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its 2019 “Cool Vendors in Security Operations and Threat Intelligence” report. “We were excited to hear Deceptive Bytes was recognized as a Gartner Cool Vendor in Read more about Deceptive Bytes recognized as a Gartner Cool Vendor in 2019![…]
Estimated reading time: 2 minutes OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows on what is known to be Patch Tuesday. Not long after reports started to appear regarding machines freezing that are unable to load after a reboot. It turned out to be an issue with several Read more about AVs: The Windows update that broke them all![…]
Estimated reading time: 1 minute CB Insights published their early-stage cyber security (startups) periodic table, stating that the selected companies are considered as the leading startups across different emerging sectors, you can find Deceptive Bytes under deception security. “We put together a periodic table of early-stage cybersecurity that spotlights the industry’s most promising young startups, emerging industry categories, and most active investors.”
Estimated reading time: 5 minutes There are various security measures you can take in order to protect your endpoint, some might be heavy on the machine and not necessarily that helpful, for instance, the traditional antivirus is only 20-40% effective, according to CheckPoint’s blog post from last year. Nevertheless, we do advise having some sort of security on your endpoint Read more about Improve your security without installing additional security software[…]
Estimated reading time: 2 minutes Since the beginning of the program we’ve been through a lot and we’re super excited to have CyLon’s demo days next week. Thanks to CyLon’s busy schedule and excellent preparations, we are ready to showcase Deceptive Bytes. Best of luck to our fellow cohort participants. Happy Holidays, The Team.
Estimated reading time: 4 minutes 2017 just started and it’s a great opportunity to remind you of ways to keep yourself and your devices (computers, smartphones and other connected devices) safe online: Make sure you have security products installed (Antivirus, Firewall, …) and kept up-to-date constantly. Stay updated, keep your operating system, drivers and software up-to-date since updates fix security Read more about Simple tricks to improve your online security[…]