<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=885880844953016&amp;ev=PageView&amp;noscript=1">
Posted by Tom Bain on September 7, 2018

The cybersecurity attack landscape moves fast, really fast. Last year, not a week passed that didn’t bring about news on a new ransomware incident. Of course ransomware’s very nature lends itself to newsworthy headlines based on how incredibly damaging to businesses this class of attacks can be.

Read More
Posted by Omri Dotan on August 27, 2018

Cybersecurity is an enormous investment with even more enormous consequences for mistakes. To build an optimal security stack you need to balance residual risks with total cost of ownership of the cyber security stack and with minimal disruption to operations.

Read More
Posted by Morphisec Team on July 26, 2018

In less than two weeks, experts and enthusiasts from around the world will converge upon the Mandalay Bay resort in Las Vegas for Black Hat USA, one of the biggest information security events of the year. Black Hat is all about about the latest threat research, the newest hacking techniques and the most innovative technology, and Morphisec is excited to be a part of it. 

Attending Black Hat 2018? We'd love to meet up. Connect with members of the Morphisec team either in a personal meeting or at one of our many Black Hat events.

Read More
Posted by Tom Bain on June 14, 2018

We all wish we were smarter. And I believe that the vast majority of people, in some way, strive to GET smarter.

As someone who has been involved in the cybersecurity industry for years, and watched it evolve, I see countless companies in this market using the aspect of intelligence to position themselves as being smarter than others. But if you have to proclaim your intelligence, are you actually smart? Or even smarter than me? Or than the next company?

Read More
Posted by Tom Bain on June 11, 2018

After less than two years in the market, Morphisec has deployed its Endpoint Threat Prevention platform to over one million endpoints worldwide, making it the fastest subscription-based B2B cybersecurity company to reach this milestone.

Read More
Posted by Shelley Leveson on April 17, 2018

Morphisec Moving Target Defense verified as Citrix Ready to enhance protection with Citrix XenApp and XenDesktop

Read More
Posted by Shelley Leveson on April 12, 2018

CISOs face an escalating battle on two fronts: externally from ever-more sophisticated attackers and internally in managing all the threat protection and additional security layers they put in to stop them. And they are losing. Despite added technology complexity and operational overhead, cyber criminals still manage to get past defenses.

According to a a new report from analyst firm ESG, 72% of organizations believe that security operations are more difficult today than they were two years ago yet 54% still suffered at least one security incident.

Read More
Posted by Tom Bain on January 22, 2018

The recent Meltdown and Spectre CPU vulnerabilities took almost everyone by surprise.  Widespread panic was staved off only by the promise of a nearly-ready OS patching fix, which it turned out, excluded a large swath of systems and created its own set of problems. 

Users are still scrambling to patch systems with an extremely complex mixture of OS, firmware and application updates. Organizations are encountering slowdowns, blue screens and reboot problems in their rush to avoid security problems. The entire stack of Spectre and Meltdown fixes has not yet been properly tested and will take time to reach anything resembling stability. 

Read More
Posted by Morphisec Team on December 28, 2017
Posted by Arthur Braunstein on October 19, 2017

 

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation.

First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more intrusive it is and the more effort it takes to manage it. The complexity and pain of managing – not buying, managing! – security tools often forces companies to reconcile themselves to unacceptable exposure, for example to security-related business disruption, for want of resources to manage cumbersome defensive technology.

Read More