A Friend in Need is a Friend Indeed I just came back from a tour in Europe, meeting with both customers and journalists. It was a very interesting Sharon Trachtman |October 03, 2011
Fighting Cyber Attacks in Real Time with AMS Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks. That’s because Ron Meyran |September 19, 2011
Security? Defense, Offense, Both? Boy the world has gotten complicated to defend hasn't it? The old adage, "information security is very basic" turns out Carl Herberger |August 02, 2011
DoS Attack Forensic: Following Sherlock Holmes Footsteps Denial-of-Service (DoS) Attack forensics has several motivations. When under attack, this process is important to identify the attacker and safely Ziv Gadot |August 02, 2011