News and Media

KEEPING CYBER-SECURE DURING THE ‘PIVOT:’ WHAT TO WATCH OUT FOR WHEN MOVING FROM PAPER TO DIGITAL

Paper isn’t a thing of the past – yet. But increasingly, whole industries are digitizing their paper records. Medical offices and hospitals, insurance companies, license bureaus – everyone is going digital. Digital saves money by reducing the need for office and storage space, and by reducing the need for staff...
Read More

RSA 2018 PROFILE: VOTIRO SECURED

Would you like a slice of cake, hold the calories? That’s the basic idea behind Votiro Secured, an Israeli company that’s been protecting clients from external, content-borne attacks since 2010. Votiro’s solutions are based on two key assumptions: 1) People simply cannot be relied upon to follow security procedures with every...
Read More

2018 FACES NEW THREATS, BUT SAME OLD PROBLEMS

Every year brings with it a new set of cyber-threats but unfortunately, the cyber-threats of 2017, 2016 and beyond are still with us. Phishing for authentication credentials, social engineering to install malware, ransomware – all these “hits of the past” are still with us in 2018, but they’ve been joined...
Read More

VOTIRO NAMED THE WINNER IN TWO CATEGORIES OF THE INFOSEC AWARDS 2018!

“Cybercrime, Hactivism, Cyberespionage, Ransomware and malware exploits are all on the rise, Votiro has won the Email Security Management and Enterprise Security awards from our magazine. They won after we reviewed nearly 3,000 infosec companies, globally, because they are an innovator on a mission to help stop breaches and get one...
Read More

VOTIRO LAUNCHES THE ZERO-DAY IDENTIFIER

Votiro, global leader in content disarm and reconstruction (CDR) technology, a solution that protects organizations against undisclosed, zero-day exploits and other ongoing cyber threats, announced today the launch of Version 8.0. The new version will have the ability to analyze cyber-attacks that were prevented due to Votiro’s Disarmer Engine. Votiro’s...
Read More

HACKERS NEED INSIDERS, SO IT’S TIME TO PROTECT STAFF FROM THEMSELVES

With the hyper-cybersecurity regulations and the nearly $10 billion spent on cybersecurity during this decade, it wouldn’t be out of place to ask — how could a financial institution or payment card firm ever get hacked?
Read More

HOW TO CURE THE HEALTHCARE SYSTEM’S ‘CYBERFLU’

Expensive, top-heavy, bureaucratic – the healthcare system is all that, but we’re all grateful to be living in an era when medicine has advanced to the point that it keeps us alive, on average, until we’re well into our 80s.
Read More

7 COMMON FLAWS THAT KEEP SECURITY MANAGERS UP AT NIGHT

Security managers are constantly asked what keeps them up at night. Unfortunately, given today’s threat landscape, it’s a very long list.
Read More

GDPR IS ALMOST HERE. BE FINED OR FLOURISH WITH CDR

Cyber risk has many faces, but the possibility of damaging an organization is a constant in all cyber-attack variations. If personal data is exposed, this not only puts the organization’s reputation at stake but also can generate harm to those individuals whose data was compromised. This is one of the...
Read More