Our Latest Blog Posts

Meet WebARX – The Web Application Firewall for Digital Agencies

WebARX is a cyber security firm focused on providing digital agencies with Website firewall, uptime monitoring and domain reputation checks for their entir...

Read Post >>
Ditsa Keren
Jun 14, 2018

Teramind – A Fully Customizable Approach to User Behavior Monitoring and Insider Threat Prevention

With employees having access to more sensitive information than ever, companies need the ability to detect and prevent threats from inside, be they through...

Read Post >>
Gail Lobel Rand
Jun 13, 2018

Best VPN Coupons for the 2018 FIFA World Cup

The 2018 FIFA World Cup is fast approaching and we have the best VPN coupons for you! Check out the best deals below....

Read Post >>
Shauli Zacks
Jun 07, 2018

Don’t Miss These 20 Leading Innovators at Cyber Week 2018

The biggest names in cybersecurity are getting together in Tel Aviv, Israel from June 17th - June 22nd at the Tel Aviv University. Cyber Week has grown ...

Read Post >>
Shauli Zacks
Jun 06, 2018

DataVisor is Using Multi-Dimensional Algorithms to Detect Fraudulent User Accounts

Professional attackers wanting to exploit legitimate social media users are mass registering abusive user accounts in ways that they appear legitimate. Try...

Read Post >>
Gail Lobel Rand
Jun 05, 2018

5 Best VPNs For Finland – For Safety, Streaming & Speeds (2019)

Finland is not a country where you need to worry about censorship; you can easily access Google, Facebook, YouTube, and more. But there are some things ...

Read Post >>
Catherine Ablett
Jun 03, 2018

4 Popular Israel-based VPNs to Keep You Secure January 2019

There are a couple of reasons you might want to use a VPN provider based in Israel. For one, Israel is not part of the 5/14 Eye Alliance. This alliance...

Read Post >>
Sara Levavi-Eilat
May 30, 2018

Medigate is Changing the Game for Connected Medical Devices

Medigate is an israeli startup company focused on securing the safe operation of connected medical devices. These mission critical devices are changing the...

Read Post >>
Ditsa Keren
May 29, 2018

Calcom Makes Hardening Automation a Smooth Process for IT Professionals

Established in 2001, CalCom provides solutions for configuration hardening automation, helping IT teams to enforce and manage security baselines for large ...

Read Post >>
Ditsa Keren
May 28, 2018

Browser Spam Could be Stealing Your Customers, PageSeal CEO Explains

Imagine you're walking into a Best Buy store to buy a TV. A sales person shows you the different models, you come to a conclusion and you're even happy wit...

Read Post >>
Ditsa Keren
May 28, 2018

5 Internet Hazards to Know About While Traveling

Whether it’s for business or for pleasure, for many traveling is part of life. In the past, we packed essentials before a trip like a toothbrush, some clot...

Read Post >>
Guy Fawkes
May 24, 2018

Covata – Military-grade Cybersecurity

Getting the top-level security is a must for many organizations in an increasingly complicated cyberworld.  Using experience garnered from military-grade s...

Read Post >>
Eytan Morgenstern
May 23, 2018

How to Watch RTP Outside of Portugal

RTP (Rádio e Televisão de Portugal), Portugal’s public service broadcasting network, is a great place to watch all the important UEFA and FIFA matchups, al...

Read Post >>
Guy Fawkes
May 23, 2018

ControlCase – Automating Compliance

With data security regulations becoming increasingly critical – especially with the upcoming General Data Protection Regulation (GDPR) – organizations and ...

Read Post >>
Eytan Morgenstern
May 23, 2018

uTorrent vs. BitTorrent – Which is Faster for Mobile/Desktop in 2019?

When it comes to torrent clients, uTorrent and BitTorrent are two veterans with huge, loyal followings. But what makes one better than the other? Is it ...

Read Post >>
Sara Levavi-Eilat
May 22, 2018

5 Best VPN Chrome Extensions in 2019 (That Actually Work!)

While you’re online, your browser is constantly sending information it collects about you to every site you visit. It shares your IP location, operating sy...

Read Post >>
Kate Veale
May 20, 2018

IPVanish – Fast, Secure and Private

As privacy concerns grow, consumers are looking for solutions to keep their internet use private, secure, and unrestricted.  Virtual Private Networks (VPNs...

Read Post >>
Eytan Morgenstern
May 17, 2018

Securing IoT Devices with SecuriThings

SecuriThings is a fully managed IoT security solution that monitors the ever-so-vulnerable cloud-connected IoT devices. In this fascinating interview, VP M...

Read Post >>
Ditsa Keren
May 15, 2018

Free VPN Download – Top 5 VPNs for 2019

Lots of websites out there claim to have free VPN downloads, but if you spend any time sifting through them, you’ll soon realize that the VPNs they’re offe...

Read Post >>
Sara Levavi-Eilat
May 14, 2018

BrandProtect – Detecting, Assessing and Mitigating Online Threats – Outside the Firewall

Outside the Firewall. It may sound like the next book in The Game of Thrones series, but it is very, very real and very today. It categorizes the ever-grow...

Read Post >>
Gail Lobel Rand
May 10, 2018
...10...1819202122...3040...