BLOG

Learn What's New With Us And In Cyber Security

Deceptive Bytes’ interview to CyberNews

Hen Lamay, Deceptive Bytes: “every organization should review its cybersecurity posture to make sure it can prevent, detect, and recover from a cyberattack” Today’s cyber threats are very different from

Deception word cloud

Deception in real-world situations

A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several

Why ML/AI is not cyber and endpoint security savior

Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now

CONTACT US

Request a free trial or send us a message

Let's get in touch

Request a demo or send us a message