Posts by SiteAdmin
The Trap of a Seemingly ‘Innocent’ File
Files are not just simply files. There are several layers and derivatives that make up an innocent ‘file’. Do you have any idea how many? Each and every file is considered a container of malicious content. Files can be hidden inside macro’s, zip – sometimes even up to 10-12 derivatives within the original file. A…
Read MoreNext Layer Protection Against Known and Unknown Cyber Threats
THE CHALLENGE: Although enterprises spend millions of dollars on cyber security, the attacks, which are constantly updated, will easily bypass firewall, Sandbox, Mail Relay / Mail Gateway and Anti-Virus systems in use within organizations. How is protection against unknown cyber threats assured? How is the safety of files exchanged on the LAN-WAN assured? Is the…
Read MoreContent Disarm & Reconstruction, what does a business really need to ensure smooth Business Continuity?
In the world of cyber-attacks, where files are no longer ‘just files’, but where every file needs to be inspected as if it were infected and were it to contain a malware deep inside, or hiding within a sub-file lying in wait for the order to launch an attack. Indeed, each file could be a…
Read MoreYazamTech Announces Strategic Partnership Program
YazamTech, an innovator of a comprehensive cyber security range of next-generation Content Disarm & Reconstruction (CDR) Solutions has launched its Strategic Partnership Program for security vendors. As a strategic technology partner, we welcome the opportunity to work with strategic partners to jointly deliver what each of us could not do alone. Our innovative Content Disarm…
Read MoreIs Phishing getting better of worse?
Phishing as an E mail attack is not new. Attackers are well aware that humans are typically the weakest link in any organization and the constant rise of phishing attacks confirms it to be true. The more success phishing attacks have, the more they are perpetrated. There are a constant array of new tools to…
Read MoreIn 2018, Ensuring E mail security can only be with a CDR Solution
https://www.csoonline.com/article/3250086/data-protection/7-cybersecurity-trends-to-watch-out-for-in-2018.html It certainly makes sense to us that since Malware and Phishing threats are some of the most common to enter the network via e mail that the adoption of more sophisticated security technologies in 2018 will need to be a CDR solution. This is not withstanding the soon to come into effect GDPR legislation…
Read MoreHappy Anniversary YazamTech!
We are so excited to be able to announce our 10 year anniversary! The creative seed that was planted 10 years ago created YazamTech’s comprehensive cyber security range of next-generation Content Disarm & Reconstruction (CDR) Solutions to prevent infected file streams from entering the network, either by blocking the infected file streams, or by actively…
Read MoreMSSP’s – Are you sure your current Email protection technology is sufficient to protect your customer’s e mail box?
So, let’s talk about it. What is involved in great Email protection, and what does an MSSP need in order to provide improved Content Disarm and Reconstruction (CDR) protection to their customers? Files that enter the internal sensitive network, via any medium, especially Emails with attachments, can be infected with a wide range of threats.…
Read MoreSeries: Password Protected Files Filtering; Threats, Gaps, Challenges
Popular password protected files can be as simple as Microsoft Office files (Word, Excel, PowerPoint), PDF, or Archive files (.zip, .7zip, .rar). The risks are clear, in these popular files security threats can be significant. We are talking about Macro in Microsoft Office files, Script in PDF files, executable files in Archive files. The…
Read More#Petya #WannaCry; Lessons Learned?
Here we go again. Just a different name. #Petya, #Wannacry not much difference in the mass damage they have caused. We are all abundantly aware. #wannacry Ransomware has now been reported in more than 150 countries around the globe, affecting hundreds of thousands of machines and more than 10,000 companies. WannaCry spreads by taking advantage…
Read More