<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Predictions 2017: Targeted Ransomware

In 2017, we predict that ransomware authors will target mission-critical servers and PCs - within targeted departments.

By holding these sensitive devices hostage, ransomware authors will be applying the right pressure at the right time to...

Day Zero and the Death of Whitelisting

>Zero Day

Why enSilo? Easy – because we stop zero-day malware on day zero.

I mean – lots of companies say they can stop zero-day malware, and truth be told, they probably can. But they’re not going to do it when it matters, which is on day...

No Penalty for Failure

If you have data of value – and you probably do – someone is eventually going to try to steal it. Because time and technology are usually on the side of the attacker, they’ll probably be successful. It doesn’t matter that you have the...

Everything You Always Wanted to Know about Ransomware but Were Afraid to Ask

BadBlock, Cerber, Chimera, CoinVault, Crypt0L0cker, CryptoJoker, CTB-Locker, Jigsaw, KeRanger, Locky, NanoLocker, Petya, Samas, TeslaCrypt, zCrypt… these are just a few out of the hundreds of ransomware cropping up in the past year.

Revenge of the Nerds: enSilo Featured as Gartner’s Cool Vendor

Being a technology vendor offering a cyber-security platform to businesses, it quite amazes me to be perceived as “cool”. If you visit our offices, you’ll hear cheers when a post-analysis of malware that we’ve just blocked shows it to be...

Infiltration by Design

Threat actors use several techniques against which we cannot prepare our defenses in advance. I tend to call these techniques “Infiltration by Design”, since attempting to ward off the threat actors using these techniques through...

Cyber Security 2016 Predictions: Amping the Traditional Cyber Kill Chain

I’ve been reading up a lot on 2016 predictions by analysts, peers and other vendors. While I agree with most of these predictions (moving towards a preventive approach, cyber-insurance guidelines will drive security initiatives, addressing...

Ransomware Goes to Hollywood

We’re a bit slow following up on our TV, so we just got around to watching The Good Wife, Season 6, Episode  5. It’s a last year’s episode, but even though couldn’t be more timely.  For those who need the background, The Good Wife takes...

AVG: the Clash of Security vs Privacy

User privacy and the role of providers holding user information has become a daily discussion. It seems as if this debate has currently reached an all-time high with AVG’s latest announcement on changing their Privacy Policy. To recall, AVG...

The 10 RSA Talks to Get the Most Out of the Conference

I’ve just completed one of the most difficult pre-RSA tasks… narrowing the list of talks to attend during the RSA SF 2015. I was able to nail mine down to the 10 that I found not only most beneficial, but also engaging.

I tried spreading it...