Skip to content


MSSP’s – Are you sure your current Email protection technology is sufficient to protect your customer’s e mail box?

So, let’s talk about it. What is involved in great Email protection, and what does an MSSP need in order to provide improved Content Disarm and Reconstruction (CDR) protection to their customers? Files that enter the internal sensitive network, via any medium, especially Emails with attachments, can be infected with a wide range of threats.…

Read More

#Petya #WannaCry; Lessons Learned?

Here we go again. Just a different name. #Petya, #Wannacry not much difference in the mass damage they have caused. We are all abundantly aware. #wannacry Ransomware has now been reported in more than 150 countries around the globe, affecting hundreds of thousands of machines and more than 10,000 companies. WannaCry spreads by taking advantage…

Read More

Response to Cyber Attack on Government and Public Institutions April 2017

On April 26, 2017, the Israeli National Cyber Authority (NCA) published it had thwarted a massive cyber-attack on Israeli businesses and infrastructure in recent days in an effort to hurt the Israeli economy. The NCA explained that the cyber-attack was based on sending posing emails in the name of the victim organization, and was targeted against 210…

Read More

Structure Based Filtering for Unstructured Data

SC Magazine recently reported that Millions of Microsoft Office 365 users were potentially exposed to a massive zero-day Ransomware attack last week. During the last 18 months, we have heard about extensive modern Ransomware and APT attacks caused by infected files that entered the network un-detected.  Files that enter the internal sensitive network, via any channel,…

Read More