Mendy is the Group CTO of Ericom's International Business operations. Based in Israel, Mendy works with Ericom's customers in the region to ensure they are successful in deploying and using its Zero Trust security solutions, including the ZTEdge cloud security platform.
FTC Issues Cybersecurity Warning for QR Codes
QR codes on ads are a simple way to grab potential customers before they move on. No wonder cybercriminals are using QR codes, too.
Read MoreAI is Making Unmanaged Devices More Dangerous
Unmanaged devices are a growing concern for many organizations. AI-enabled zero day attack creation is set to increase this and other threats.
Read MoreStop Phishing to Prevent Up to 90% of Security Breaches
Given the enormous sums being spent on phishing training, there are many studies that attempt to evaluate the effectiveness of the training. Many have found that it can't transform users into a reliable phishing defense force.
Read MorePlaying for Keeps: Hackers Target Gaming and Gambling
Understand why attacks on gaming companies are on the rise and read about solutions that can help protect web-based games from attack.
Read MoreRegulated Industries and Shadow IT Headaches
For organizations in highly regulated industries, like financial services, Shadow IT poses a double threat, with us exposing them to compliance risk as well as breaches and cybersecurity risk.
Read MoreIt’s Time to Stop Relying on Yesterday’s Cybersecurity Tools
Unfortunately, enabling WAFs to identify new zero-day threats doesn't go far enough to reliably protect web apps from threats.
Read Moremr. d0x Goes Phishing
Users are falling for new phishing attacks that are using fake sign-in forms, demonstrating (yet again) that enterprises must protect their users from phishing, instead of depending on users to protect themselves.
Read MoreCan You Trust That Contractor’s Device? Cybersecurity for the Gig Economy
Freelancers and 3rd party contractors often need access to your networks, software and cloud apps. But contractors' unmanaged devices pose a serious risk to your organization.
Read MoreProtect Users and Networks from Malware Hidden in Images and Attached Files
RBI stops steganographic attacks, in which malware is concealed within the code of images or other presumably innocent content, in ways that AV/firewalls cannot detect.
Read MorePreventing Cyberattacks by Blocking Hacker Reconnaissance
Savvy cybercriminals do careful reconnaissance to gather info about vulnerabilities in a target’s systems before launching a full-on attack.
Read More