The world has been informed of Spectre and Meltdown. Spectre and Meltdown are hardware flaws and/or vulnerabilities that allow an attacker to run unprivileged code to read from privileged memory. Due to Spectre and Meltdown being hardware flaws there are alarms and red flags running wild. Three things to consider to block malware from
This year is coming to an end. The media headlines were constantly reporting massive attacks and breaches. We expect nothing less in 2018.
In 2017, the new administration will push for more legislature around cybersecurity, but it will be ultimately ineffective.
We predict that in 2017 enterprise network security will shift to the cloud and be offered as a service. (enSilo’s endpoint protection is already cloud-managed.)
In 2017, we predict that the Managed Security Services Providers market will continue to grow as security vendors start to offer their own security services.
Being a technology vendor offering a cyber-security platform to businesses, it quite amazes me to be perceived as “cool”. If you visit our offices, you’ll hear cheers when a post-analysis of malware that we’ve just blocked shows it to be unique, and happy shouts when our developers announce our platform’s support of a new computing platform.
Call that the million dollar question. Literally. And it’s a question that was raised a lot today as we closed the second tranche of enSilo’s Series A financing, raising a total of $19 million for the round and $21 million in total funding. The second tranche of $9 million was led by Rembrandt Venture Partners with previous investors Carmel
Threat actors use several techniques against which we cannot prepare our defenses in advance. I tend to call these techniques “Infiltration by Design”, since attempting to ward off the threat actors using these techniques through infiltration-oriented technologies (from anti-phishing and reputation controls through to anti-exploitation) just
I’ve been reading up a lot on 2016 predictions by analysts, peers and other vendors. While I agree with most of these predictions (moving towards a preventive approach, cyber-insurance guidelines will drive security initiatives, addressing the need to prevent downtime during alert investigation) I hadn’t yet come across those re-visiting the