BLOG

Learn What's New With Us And In Cyber Security

Deceptive Bytes’ interview to CyberNews

Hen Lamay, Deceptive Bytes: “every organization should review its cybersecurity posture to make sure it can prevent, detect, and recover from a cyberattack” Today’s cyber threats are very different from

The little virus that took down an empire

Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and causing businesses losses which can be significant. When you think

Endpoint protection & misconceptions

#1 – Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components on the endpoint itself, the vendor’s server still utilizes existing

Why ML/AI is not cyber and endpoint security savior

Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now

CONTACT US

Request a free trial or send us a message