News and Media

Information Week – GoAnywhere MFT Vulnerability

Votiro Founder & CTO, Aviv Grafi, chimes in on the recent Clop Ransomware attack and the worries of these attacks during the file transfer process with similar technologies.
Read More

2022 Q4 Tag Cyber – An Interview with Ravi Srinivasan, CEO of Votiro

Tag Cyber interviewed Ravi Srinivasan, Votiro CEO, about our Zero Trust Content Security solution. You’ll be able to find the interview on page 103 of the document.
Read More

Application Security Weekly #222 – Aviv Grafi

Votiro’s Founder & CTO, Aviv Grafi, discusses the balance between security and productivity regarding the decisions that go into handling potentially malicious files.
Read More

Risky Business #680 – Uber, Rockstar Games hacker arrested

Ravi Srinivasan, Votiro’s CEO, joins the show this week to talk about how people are using content disarm and reconstruction.
Read More

Votiro RetroScan reviews all sanitized files for any previously unknown threats

Votiro launched RetroScan functionality, which produces threat analytics on the undetectable threats that Votiro eliminates.
Read More

Votiro Cloud Unveils RetroScan Feature to Deliver Threat Analytics Into All Prevented Cyber Threats

New capability enables customers to retrospectively view malware and zero-day threats eliminated by Votiro Cloud  NEW YORK – October 25, 2022 – Votiro, the category leader in Content Disarm and Reconstruction (CDR), today announced the launch of its RetroScan functionality, which produces threat analytics on the undetectable threats that Votiro eliminates. After Votiro removes all...
Read More

Votiro Cloud Integrates With Box Content Cloud to Provide Zero Trust Content Security

Votiro joins the Box Technology Partner Program; Empowering Box enterprise customers to facilitate secure collaboration with always safe content. NEW YORK – October 18, 2022 – Votiro, the category leader in Content Disarm and Reconstruction (CDR) technology, today announced its integration with Box’s leading Content Cloud to prevent ransomware and other evasive file-borne threats from...
Read More

Zero Trust: Data-Centric Culture to Accelerate Innovation and Secure Digital Business

Zero trust is one of the most used buzzwords in cybersecurity, but what exactly does this approach entail?
Read More

2 [Votiro] How Hackers Use Weaponized Documents to Attack You

Have you ever posted an open position on your website or LinkedIn? Have you or your employees ever received resumes in a pdf format via email or message services?  By pretending to be an applicant for your job advertisement or application, hackers send you a pdf that can contain malware and hack your system via...
Read More