Implementing a sound micro-segmentation approach is one of the best steps that security teams can take to gain greater infrastructure visibility and secure critical applications, helping organizations protect high-value targets.
About Igor Livshitz
Igor is a cyber security expert with over 12 years of hands-on experience in a wide variety of technologies. Igor has vast experience in managing R&D teams in innovative projects and a proven track record of delivering great products tailored to the customers’ needs.
Entries by Igor Livshitz
File integrity monitoring is an internal control that examines files to see the way that they change, and is essential for breach detection, giving you the granular, real-time information on every change to your files, including the who, what, where and when.
An attack vector is the way that an adversary can gain unauthorized access to your network or devices. What should smart businesses look out for, and how can they protect themselves against these increasingly sophisticated cyber attacks and threats?
Everyone knows about the many benefits of the cloud: it is infinitely scalable, developer-friendly, and easy to use. However, we often avoid addressing the reality that the cloud is not perfect. The truth is that, despite the cloud’s many merits, it presents a significant challenge from a security standpoint.
Containers and orchestration systems use numerous technical abstractions to support auto-scaling and distributed applications that obfuscate visibility into application communication flows…