Mendy Newman

Mendy is the Group CTO of Ericom's International Business operations. Based in Israel, Mendy works with Ericom's customers in the region to ensure they are successful in deploying and using its Zero Trust security solutions, including the ZTEdge cloud security platform.

Playing for Keeps: Hackers Target Gaming and Gambling featured image

Playing for Keeps: Hackers Target Gaming and Gambling

Understand why attacks on gaming companies are on the rise and read about solutions that can help protect web-based games from attack.

Read More
Regulated Industries and Shadow IT Headaches featured image

Regulated Industries and Shadow IT Headaches

For organizations in highly regulated industries, like financial services, Shadow IT poses a double threat, with us exposing them to compliance risk as well as breaches and cybersecurity risk.

Read More
It’s Time to Stop Relying on Yesterday’s Cybersecurity Tools featured image

It’s Time to Stop Relying on Yesterday’s Cybersecurity Tools

Unfortunately, enabling WAFs to identify new zero-day threats doesn't go far enough to reliably protect web apps from threats.

Read More
mr. d0x Goes Phishing featured image

mr. d0x Goes Phishing

Users are falling for new phishing attacks that are using fake sign-in forms, demonstrating (yet again) that enterprises must protect their users from phishing, instead of depending on users to protect themselves.

Read More
Can You Trust That Contractor’s Device? Cybersecurity for the Gig Economy featured image

Can You Trust That Contractor’s Device? Cybersecurity for the Gig Economy

Freelancers and 3rd party contractors often need access to your networks, software and cloud apps. But contractors' unmanaged devices pose a serious risk to your organization.

Read More
Protect Users and Networks from Malware Hidden in Images and Attached Files featured image

Protect Users and Networks from Malware Hidden in Images and Attached Files

RBI stops steganographic attacks, in which malware is concealed within the code of images or other presumably innocent content, in ways that AV/firewalls cannot detect.

Read More
Preventing Cyberattacks by Blocking Hacker Reconnaissance featured image

Preventing Cyberattacks by Blocking Hacker Reconnaissance

Savvy cybercriminals do careful reconnaissance to gather info about vulnerabilities in a target’s systems before launching a full-on attack.

Read More
Instant Messaging Could Take Down Your Network featured image

Instant Messaging Could Take Down Your Network

IM web clients pose a real danger to network security because a single click on a ransomware-infected file can bring an organization to its knees.

Read More