The recent SolarWinds incident is a stark reminder that we all should re-evaluate the blind trust we put into third-party components inside our networks. While the SolarWinds incident is fresh in many of our minds, it’s far from the first successful supply chain attack in the annals of cybersecurity. In 2011, another incident occurred which […]
About Igor Livshitz
Igor is a cyber security expert with over 12 years of hands-on experience in a wide variety of technologies. Igor has vast experience in managing R&D teams in innovative projects and a proven track record of delivering great products tailored to the customers’ needs.
Discover how to protect your systems against SMB vulnerabilities, and the latest critical Microsoft vulnerabilities released.
Security in the cloud is different from traditional best practices for securing on-prem deployments. This blog provides an AWS security checklist that includes the most crucial steps for implementing network security best practices within a cloud environment.
Allowing security to be an enabler of cloud adoption instead of a hurdle to overcome was a major talking point at this year’s AWS re:Inforce conference. Best practices in scale, coverage, automation, migration and flexible policy were all valuable takeaways – and Guardicore’s micro-segmentation technology is a single, unifed solution for all platforms that checks all the boxes.
Docker, Kubernetes, and even Windows Server Containers have seen a huge rise in popularity the last few years. With the application container market having a projected CAGR (Compound Annual Growth Rate) of 32.9% between 2018 to 2023, we can expect that trend to continue. Containers have a huge impact on application delivery and are a […]
Like with any technology, Docker too has its own set of security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
A major vulnerability related to containers was released on Feb 12th. The vulnerability allows a malicious container that is running as root to break out into the hosting OS and gain administrative privileges.
A low interaction honeypot is simple to deploy and takes very little effort to maintain, but can never provide the benefits you can enjoy with the latest high interaction honeypot technology. When dynamic deception meets micro-segmentation, you have a truly risk-free decoy to fool attackers and learn about their behavior.
Implementing a sound micro-segmentation approach is one of the best steps that security teams can take to gain greater infrastructure visibility and secure critical applications, helping organizations protect high-value targets.
File integrity monitoring is an internal control that examines files to see the way that they change, and is essential for breach detection, giving you the granular, real-time information on every change to your files, including the who, what, where and when.