Trump, Twitter and Hackers? Don’t Just Use Passwords

“A Twitter account probably has no financial value by itself but depending on the account owner, it could be used to spread false information and create wrong impressions,” Amit Ashbel, director of product marketing and cyber security evangelist at application testing company Checkmarx Ltd. in Tel Aviv, told Bloomberg BNA.   Click here for the

Read More »

Report: malicious ‘fake’ news links used to socially engineer

Amit Ashbel, cyber-security evangelist at Checkmarx told SC: “I think that it’s not exactly the fake news that create these excellent lure tactics but rather the targeted news.” “Modern social engineering campaigns are based on research. Hackers build a persona profile for the people they are after.” Ashbel added, “The more information you expose about

Read More »

Cybersecurity in 2017: Interview with OWASP Author Jim Manico

As the software world still reels from the major hacks and breaches that occurred, and surfaced, in 2016, it’s critical that organizations ensure that their code security gets the attention that it deserves in 2017, and beyond.   In order to gain some quick insight into the application security landscape for 2017, we conducted a

Read More »

Ackcent

Ackcent is a company specializing and exclusively dedicated to provide cybersecurity services and solutions. Our aim is to effectively protect the digital assets of our customers. Ackcent is specialized in the provision of services for the protection of critical digital assets and our professionals has an exceptional experience in cybersecurity for critical environments of public and private organizations

Read More »

AdCare

AdCare LTD was formed in 2007 as a technology company specializing in Outsourced Managed Technology Services – the practice of outsourcing day-to-day management responsibilities and functions as a strategic method for improving operations and cutting expenses. This covers Managed IT Service platforms – computing frameworks used to deliver network-based services, applications and equipment to enterprises, residences, or other service providers. A

Read More »

Shift Left – how to improve security in your developers’ code – do it earlier

There was a pretty simple premise behind last week’s Shift Left conference, organised by Checkmarx at the Bulgari hotel in Knightsbridge.  If you look at the software development cycle, it typically starts with the setting of requirements, design, build, test, deploy and maintain.  All too often security considerations don’t get a look in until after

Read More »

8 Chrome Extensions Every Security Pro Needs

Google Chrome is the most popular web browser, and it comes with a large library of Chrome extensions with the aim of helping you customize your browsing experience. And with so many options, it can be hard to find the extensions which are right for you. Therefore we put together this list featuring the top

Read More »

Astec

Astec d.o.o. has been for several years the leading independent information security consulting and service oriented company in Slovenia. Our services include ISMS, risk analysis, security assessment and penetration testing, source code security analysis, SIEM, DLP, IDM, FW, IPS solutions, etc.. We have made partnerships with the leading IT companies (CheckMarx, CheckPoint, StoneSoft, Palo Alto

Read More »

ATIA D.O.O.

ATIA is a IT security integration and consulting company. ATIA is fully focused in providing IT security services including: penetration tests, source code analysis, vulnerability assessments, risk management analysis, business continuity analysis and the implementation of information security management systems. Our clients come from different sectors including: telecom operators, banks and financial institutions, ICT companies,

Read More »