On November 13th Paris, France experienced its severest terrorist attack in history, done by ISIS members and affiliates. The attack triggered a “cyber-war” between ISIS-affiliated hackers and the Anonymous Collective. Skirmishes like these occur almost regularly after a major terrorist attack between the two sides (as seen after previous attacks in France, Belgium and Denmark).
Category Archives: Uncategorized
TEL AVIV, Israel and HACKENSACK, N.J., October 21, 2015 – Cytegic, a provider of cybersecurity risk management solutions, today announced its expansion in North America with the opening of its U.S. headquarters in Hackensack, New Jersey. CEO and co-founder Shay Zandani has relocated from Israel to New Jersey to oversee the company’s growth in the
TEL AVIV, Israel and HACKENSACK, N.J., October 21, 2015 – Cytegic, a provider of cybersecurity risk management solutions, today announced it has completed its second round of angel funding, securing an additional $3 million from a prominent set of angel investors, bringing total funding in the company to $6 million. Cytegic will use this investment
n light of the increasing volume and sophistication of cyber threats, organizations needs to identify their relevant risk, determine their cybersecurity posture and act upon it. That much is clear, but it is easier said than done. Organizations needs not only an agreed methodology to work by, but also a tool to help them achieve that goal and properly assess their threat landscape, control maturity and better prepare for the upcoming threats.
The FFIEC (Federal Financial Institutions Examination Council) has developed a Cybersecurity Assessment Tool, which was released on June 2015.
The month of Ramadan is the holiest month in the Islamic calendar. During this month devoted Muslims spend their days praying and fasting, and all major activities grind to a halt. We set out to explore whether the halt in daily activities would also be reflected in hacking activities emanating from or to targeting Islamic nations.
Hi All, We are happy to announce that we’ve recently inaugurated our new cyber Intelligence department offices! Please join us for a tour of the new offices!
Everybody loves big sporting events. At least, every hacker… our latest analysis shows hackers’ behavior before and during the 2015 “Copa America” football championship in Chile. Cytegic DyTATM intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. Using DyTATM intelligence platform we were able
Come meet Cytegic at RSAC! Meet us at the Booth #S915 (South Expo Hall, OATH booth) to review our products and receive a free trial version of our DyTA intelligence product! We hope to see you all there!
I’ve recently attended a cybersecurity conference. In addition to the industry regulars there were about 70 start up companies presenting in the start up pavilion. There was a definite division of technology among them- 80% dealt with detection (including mobile, SCADA/ ICS etc.) and the rest in various topics (DLP, MDM, management, intelligence etc.). This
Hi All, We are excited to invite you to come over to our booth at Cybertech 2015 startup pavilion. At our booth you will be able to experience first had our 3 Products and meet the team. You will be able to demo all of our systmes in our booth: • CyMA (Cyber Maturity Assessment)
My grandma will turn 90 in several months. She never owned a computer, and I’m pretty sure she doesn’t know how use one. Her mobile phone has actual keys and is anything but smart. Yet this holiday season she too can become a target for cyber criminals. How’s that? Very simple- she owns a credit card.
Leumi Card, one of Israel’s largest credit card providers, was the victim of a recent extortion attempt by seven former employees, who threatened to release the private information of nearly 2,000,000 credit card holders to the internet if their financials demands were not met. The company approached the police 2 weeks ago and, after receiving