Showing posts from March, 2020

Cyber 2.0 vs Traditional antivirus and Organizational Firewall

Current security standards in an organization consists of the following base components: ·          Antivirus (standard and or next gen) ·          EDR or IDS\IPS systems ·          Organizational Firewall Each defense mechanism Is designed to stop Cyber Threats in its own way: Standard Antivirus: Search for signatures of known virus and malware codes Next Gen Antivirus: Search for anomaly in either the code or the behaviors of the programs EDR and IDS\IPS system: analyses the traffic of the network for known signatures, anomaly’s or suspicious behavior The firewalls (internal or external): minimize the allowed traffic per ports and\or applications. All of these different defense mechanisms, suffer from a vital flow that is inherit in the system: They can only protect what they know! Even the anomaly and behavior-based system, are limited by what they described as an anomaly or malicious behavior. The main problem with the current model is that this vi

Cyber ​​2.0 introduces: "Work in Time of Corona"

Cyber ​​2.0 introduces: "Work in Time of Corona" Nowadays, when the demand for employees working from home is growing, employees who leave the organizational security system, find themselves exposed to cyber attacks that exploit the fact, that their computers are exposed to threats when working from home. Massive new-generation cyber protection is required for employees working from home: protection that allows the organization's employees transparency, receiving threat alert notifications, and even blocking the threats that employees are exposed to. This protection will allow protection of the organizational components that employees are addressing, while at the same time allowing employees to maintain their privacy Cyber ​​2.0, which provides a service that essentially prevents and blocks any spread of cyber - attack, including new and unknown attacks, within and outside the organizational system, has already begun moving its customers into a configurati