Most recent

Amir Mizhar

Amir Mizhar
Founder, Chairman & Chief Software Officer at Safe-T Data
Find me on:

Recent Posts

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Want to Make $100 Million from Hacking? Steal Press Releases

Stealing credit card number? Old hat. Ransoming information? Been there, done that. Apparently, if you want to make real money from hacking (not that we’re suggesting this), press releases are the latest and most lucrative piece of valuable information.

Why DNSSEC Isn't Enough

By Amir Mizhar October 15, 2018

When you type a URL into the top of your browser and hit “enter,” a number of complicated things begin to happen. Somehow, the alphanumeric English language of a URL gets translated into the machine language of an IP address, allowing your browser to resolve a new webpage.

Anonymous Application Access: Get This Valuable Service Safely On Board

In an age where the cloud has made browser interactions the norm, companies are discovering the value of anonymous application access and client-less access.

Are You Securing Cloud Storage Wrong?

No cloud implementation – in any business unit at any company – is perfect. That’s a given. IT administrators, directors, and CIOs have always been forced to make compromises between convenience, cost, and security. 

More Vendors Mean More Cyberattacks – Protect Your Supply Chain!

By Amir Mizhar March 13, 2018 cyberattack

The rise of "as a Service" companies mean that the corporate supply chain is more complicated than ever. Your company probably doesn't do its own hiring, accounting, or software development in-house.

Industrial Security: Is the Air Gap Still Viable?

By Amir Mizhar February 7, 2018 IIoT, Industrial Security

In theory, the digital aspect of industrial control systems is supposed to be air-gapped from run of the mill corporate networks. In practice, however, there will often be bridges – left either accidentally or on purpose – between industrial controls and the general-purpose internet. 

How Your Employees Can Securely Share Files via Secure Cloud Access

Everyone values efficiency and simplicity, which is why thousands of technology startups and established companies have been “disrupting” the old way of doing business with new solutions for long-standing challenges. 

3 Risky Scenarios of Online Application Sharing

File upload is one of those can’t-live-with-it, can’t-live-without-it items that makes information security so fraught with difficulty. On the one hand, it automates parts of doing business – especially B2C business – that would typically require a person to make a phone call, send an email, or even dust off their fax machine.


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!