Category Archives: Blog

Highlights from our monthly Big Data analysis report (Produced by DyTA)

Cytegic DyTATM intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTATM enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry sector and corporate

Read More

Why are we still constantly surprised that Intelligence (espionage) Agencies do exactly what they’re supposed to do?

Intelligence agencies belonging to nation-states perform cyber-espionage. That’s a fact, and it’s been a fact for decades. No worth arguing otherwise or claiming that they are breaking the law – it’s their mandate and they don’t try to hide it. I’m not surprised when Leo Messi scores a goal, when a fireman puts out a

Read More

Anthem data breach- why have a nation-state hackers targeted a Health Insurer company and what can we do about it?

US health insurance giant Anthem confirmed last week that data on as many as 80 million customers at was stolen by hackers. The stolen information includes names, birth dates, social security numbers, street addresses, email addresses and employment information, the company said. It is very likely that this attack has been going on for months

Read More

The CIO Catch 22- you must innovate,but do so without increasing risk (By Mr. Eli Frank, Former CIO)

CIOs are required to lead the innovation in their organizations, and some even call them to lead “digital business transformation” and to transform even traditional enterprises into the digital era. But innovation comes with inherent risks, and CIOs are required to mitigate these risks and minimize them as much as possible. So innovation leads to

Read More

Implementing a Cybersecurity Initiative for Senior Leadership in Small, Medium, and Large size companies (Guest post by Alex A. Kayayian, MS )

I wanted to start by thanking Yotam Gutman for asking me to become a guest blogger on Cytegic. IT security or cybersecurity are both terms that we hear quite often these days. All of the T.V. news stations are constantly bringing this ever-growing need for increased cybersecurity measures into the limelight. Most recently, the data

Read More

Demilitarization of Cyberspace (discourse)

Cyberwar. Cyber-weapons. Cyber super-power. Cyber-attacks… The entire cyber jargon is tainted in camo colors, making it to look like a bloody battlefield. As with many other things, this too is to blamed on popular films and TV shows from that horrible decade, the 80’s, which created such a powerful image of the military hacker –

Read More

Assets: Fundamental Target of Cyber Attacks; Fundamental Subject of Cyber Defenses

Modern businesses have whether by intent or practice always held the concept of “return” as a motivating objective and a raison d’etre.  Capitalism functions via the judicious allocation of “capital” as an investment base to generate returns.  Returns increase the value and number of assets which can be converted to more capital and the return

Read More

For Every Action There Is a Cyber-Reaction

In recent years, it has become a known fact, that if a country or its government performs actions which may be perceived as ‘provocative’, it automatically becomes a viable target for hackers, and specifically Hacktivists. Cyber-reactions have become the norm when it comes to military operations, campaigns and even tensions between countries – for example,

Read More