Most recent

Amir Mizhar

Amir Mizhar
Founder, Chairman & Chief Software Officer at Safe-T Data
Find me on:

Recent Posts

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize them – how would you use these tools in the context of an actual security exercise?

Creating A Secure Data Workflow With SDE

By Amir Mizhar December 19, 2018

What does it look like when you secure a file with Safe-T? We talk a lot about creating granular access controls and integrating with your existing security structure, but it may just be easier to put the whole journey in context. Starting with an email and an attachment, here's how Safe-T’s Secure Data Exchange solution takes care of a file – and its accompanying text – in order to keep it[...]

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Want to Make $100 Million from Hacking? Steal Press Releases

Stealing credit card number? Old hat. Ransoming information? Been there, done that. Apparently, if you want to make real money from hacking (not that we’re suggesting this), press releases are the latest and most lucrative piece of valuable information.

Why DNSSEC Isn't Enough

By Amir Mizhar October 15, 2018

When you type a URL into the top of your browser and hit “enter,” a number of complicated things begin to happen. Somehow, the alphanumeric English language of a URL gets translated into the machine language of an IP address, allowing your browser to resolve a new webpage.

Anonymous Application Access: Get This Valuable Service Safely On Board

In an age where the cloud has made browser interactions the norm, companies are discovering the value of anonymous application access and client-less access.

Are You Securing Cloud Storage Wrong?

No cloud implementation – in any business unit at any company – is perfect. That’s a given. IT administrators, directors, and CIOs have always been forced to make compromises between convenience, cost, and security. 

More Vendors Mean More Cyberattacks – Protect Your Supply Chain!

By Amir Mizhar March 13, 2018 cyberattack

The rise of "as a Service" companies mean that the corporate supply chain is more complicated than ever. Your company probably doesn't do its own hiring, accounting, or software development in-house.

Industrial Security: Is the Air Gap Still Viable?

By Amir Mizhar February 7, 2018 IIoT, Industrial Security

In theory, the digital aspect of industrial control systems is supposed to be air-gapped from run of the mill corporate networks. In practice, however, there will often be bridges – left either accidentally or on purpose – between industrial controls and the general-purpose internet.