Most recent

Amir Mizhar

Amir Mizhar
Founder, Chairman & Chief Software Officer at Safe-T Data
Find me on:

Recent Posts

It's Time To Leave Your PGP Security Behind

In the world of private encryption, there are few words more apocalyptic than “I gave away my private key.” It is rule number one of PGP security – never reveal your private key to anyone else. Unfortunately, in a maddening and completely avoidable blunder, the Adobe security team posted their private PGP key publicly on their blog.

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not

Bad news for cloud proponents! The security firm Skyhigh Networks reports that 7% of Amazon S3 buckets are set to unrestricted public access, meaning that anyone with a link to the server can read it. Not only are almost one-in-ten databases completely insecure, more than a third are completely unencrypted. It’s open season on S3 implementations.

 

How to Reduce Your Cyber-Attack Surface Before It's Too Late

Has your attack surface increased as you've moved more workloads to the cloud? While moving to the cloud can be a great idea, it can also be a security headache for IT departments who have not increased their security staff to keep up with the demand. All it takes is one data breach to put your organization at risk and endanger the value that moving to cloud brings.

Understanding the new Cloud Security Guidance from the CSA

By Amir Mizhar September 17, 2017 Cloud Security
At this year's Black Hat conference in July, the Cloud Security Alliance (CSA) announced new guidelines for enterprises to create secure public and private cloud computing architectures. The last time this update occurred was in 2011, which means that this update incorporates over half a decade of technological advancement. There is a significant new body of work in Guidance for Critical[...]

How Will You Protect Data on Hybrid Cloud Storage?

You are probably using a hybrid cloud. Even for the smallest companies, the litmus test is pretty simple: do you keep some data on a shared drive that's exclusive to your company, and other data on an online cloud storage platform like Dropbox? If so, then congratulations, you're a hybrid cloud user.

Fileless Malware Attacks are a Bad Sign for the Security Landscape

Cybersecurity is supposed to work a certain way. An attacker sends a suspicious-looking file to a user at a company they're targeting. An antivirus software scans the file, finds that it matches a viral signature, and quarantines it. In this case, the day is saved—but what if a viral payload no longer arrives in the form of an executable?

How to Battle Cyber Attacks in the Cloud

If you are a DropBox customer, you are probably racing to change your login password. None of us want to be one of the 68 Million DropBox accounts that were leaked, right?


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

close

Contact Us:

Contact Us: