Estimated reading time: 2 minutes #1 – Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components on the endpoint itself, the vendor’s server still utilizes existing OS functionality and built-in “agent” to perform the security tasks that are usually implemented in a dedicated agent. This means that the endpoint’s resources are Read more about Endpoint protection & misconceptions[…]
Estimated reading time: 3 minutes Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its 2019 “Cool Vendors in Security Operations and Threat Intelligence” report. “We were excited to hear Deceptive Bytes was recognized as a Gartner Cool Vendor in Read more about Deceptive Bytes recognized as a Gartner Cool Vendor in 2019![…]
Estimated reading time: 2 minutes OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows on what is known to be Patch Tuesday. Not long after reports started to appear regarding machines freezing that are unable to load after a reboot. It turned out to be an issue with several Read more about AVs: The Windows update that broke them all![…]
Estimated reading time: 3 minutes Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now reserved to humans. Their potential is so powerful that films such as The Terminator depict how they become smarter than their creators, turn against humanity Read more about Why ML/AI is not cyber and endpoint security savior[…]
Estimated reading time: 1 minute We were recently listed in Smartrev Cybersec‘s first Israeli cyber startup observatory (Jan-2018 edition) Go to CyberStartupObservatory.com to learn more about Israel’s cyber startup landscape.
Estimated reading time: 1 minute CB Insights published their early-stage cyber security (startups) periodic table, stating that the selected companies are considered as the leading startups across different emerging sectors, you can find Deceptive Bytes under deception security. “We put together a periodic table of early-stage cybersecurity that spotlights the industry’s most promising young startups, emerging industry categories, and most active investors.”
Estimated reading time: 3 minutes In my previous post, I wrote that Anti-malware signatures are dead. Just days after, Check Point published on their blog that it’s estimated that nowadays traditional antivirus software detect between 20%-40% of malware, a decline from 2014, when a Symantec’s VP estimated the number at 45%, calling Antivirus software “dead”. Your Firewall and other similar Read more about Hello new and innovative security technologies[…]
Estimated reading time: 2 minutes Anti-malware signatures departure is imminent. For several years traditional antivirus companies are a few steps behind malware authors, unable to cover the millions of malwares created yearly. For example, check the latest posts and hashes at Malware Traffic Analysis with VirusTotal. Often, many engines may not recognize new threats, even from known malware families and Read more about Goodbye Anti-malware Signatures[…]