New InfoSec products of the week

Here’s a look at the most interesting products from the past week, featuring releases from Anomali, CybeReady, Endace, Enzoic, Palo Alto Networks, Perimeter 81, Secret Double Octopus, and VMware.

5 Examples of a Potential Weakness to the Human Firewall

Human firewalls can often function as an extra layer of cybersecurity. Creating a human firewall means ensuring that staff are a part of the security process by providing them with structured and ongoing education on the cybersecurity threat environment. While human firewalls can improve an organization’s overall security, human error is part of many successful […]

CybeReady Adaptive Training Platform Levels up Corporate Security Posture in Midst of The Great Resignation

CybeReady, provider of the first adaptive cybersecurity training platform, today unveiled major enhancements to its Adaptive Training Platform as global workforces experience churn as a result of pandemic-related security issues and The Great Resignation. The new capabilities increase the scope of impact on remote work environments and ensure consistent security training for new employees.[…]

Transforming Security Culture with a Fully Managed Training Program

Transforming Security

CybeReady has attained the number one rank on PeerSpot for security awareness training providers. According to Dmitriy S., PeerSpot member and VP and CSO/CISO at Avid, a US-based technology and multimedia company, the autonomous platform creates an engaging learning experience for employees and enables organizations to run successful and frictionless training. In his PeerSpot review, […]

Mike Polatsek, CybeReady: “80-95% of breaches are due to human errors”

Cybeready-interview

Malicious threats have been a part of the Internet culture for what seems like forever. However, with employees now working from home, cyberattacks have significantly increased. It’s common for hackers to target organizations – especially those that choose to ignore the importance of cybersecurity. And though there are many quality cybersecurity measures that can be […]

The No-Nonsense Guide to Data Protection

Security awareness

Hackers and bad actors continue to get more creative and persistent in their attempts to access your data. All it takes is one vulnerability in your organization to let them in and create a data breach. In fact, the number of data breaches is growing steadily.  In 2021, by the end of September, 1,291 data […]

A Step-by-step Guide to Preventing Tailgating Attacks

Complex digital hacking methods garner the most attention from cybersecurity leaders and professionals today, but physical security hacks still pose considerable threats to your business. A low-tech physical hack known as tailgating provides an easy entry point into restricted areas where malicious parties may carry out a slew of damaging activities.  With 71 percent of […]

7 Steps to a Successful Human Firewall

Human Firewall

A human firewall is a security team composed of well-trained and highly engaged individuals. They act as the first line of defense against cyberattacks and can be critical to the success of your organization’s security posture. The number one cause (52% of all data breaches) of data breaches is human error. This means that having […]

Hi-5 With A CISO:
Idan Sivan

Copy-of-HI-5-

  CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via 5 questions and insights. Idan Sivan has been working in the cybersecurity space for over a decade and served as Chief Information Officer of AWIS in his previous rule. Three years ago he was appointed as the Chief Information Officer & Chief Information Security […]

4a34e52d-562b-4e1e-8b71-5c005a7559a9