How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, safeguarding urban security increasingly involves developing and applying cyber defense technology and the analysis of big data. And they need prevention and security technology to keep pace with a…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

Why Your Firewall Needs a Multilayer Inline Solution for DDoS Protection

Deploying a multilayered inline solution stops your firewall from becoming the weakest link in your network security during massive DDoS attacks, and keeps critical network services running. Firewalls and intrusion prevention systems (IPS) have become a standard in network protection, installed in every network. Although they have greatly advanced over the years in safeguarding against…