Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Netta Schmeidler on October 5, 2016

A Brief History of vdi

Virtual Desktop Infrastructure (VDI) is not a new concept – in fact virtualized desktops can be traced back to the 1960s, when IBM divided up mainframes into virtual machines to allow for multiple, simultaneous users. The...

Read More
Posted by Mordechai Guri, Ph.D. on September 23, 2016

Ransomware has grabbed mainstream media attention recently but it’s nothing new – in fact, its origins can be traced back to floppy disk times. Part of ransomware’s new found notoriety is certainly due to the criminals’ latest target of choice, the...

Read More
Posted by Dudu Mimran on September 14, 2016

It may sound odd, but cybersecurity has a huge emotional component. Unlike other industries that are driven by optimization and financial gains, cybersecurity has all the makings of a Hollywood movie—good guys, bad guys, nation-states attacking...

Read More
Posted by Michael Gorelik on September 8, 2016

Spam is still the preferred attack vector for cyber criminals and malware spam campaigns continue to increase. According to the Symantec Internet Threat Report, 1 in 220 emails in 2015 contained malware. While this figure may seem low, consider that...

Read More
Posted by Mordechai Guri, Ph.D. on August 10, 2016

It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber security, with its rapid growth and change as new threat types, targets and...

Read More
Posted by Morphisec Team on August 4, 2016

Black Hat USA is in full swing, and cyber experts in every field have descended on Vegas to catch up on the latest cyber threat research, see the latest security technologies and cram in as much hacking and fun as possible into a few short days....

Read More
Posted by Ronen Yehoshua on June 23, 2016

Last week’s Gartner Security & Risk Management Summit crammed several months’ worth of information, analyses, workshops and networking into 3 ½ short days. Though many messages were familiar, a shift could be detected, a recognition that the...

Read More
Posted by Shelley Leveson on June 1, 2016

How do you outsmart malware? In an article published by Tech Crunch last week, tech reporter Ben Dickson investigates the new generation of smart malware. He manages to sum up the crux of the problem in two sentences: “Virus definition databases...

Read More
Posted by Arthur Braunstein on May 25, 2016

The ancients’ experience of modern computing was limited to say the least, but they gave us a nice framework, The Socratic Method for cyber security, that moderns can use for dealing with the problem of cyber security. The Socratic Method is a...

Read More
Posted by Morphisec Team on May 23, 2016

Excerpted from the ebook “Deception and Counter Deception: Moving Target Attacks vs. Moving Target Defense” by Mordechai Guri, Chief Science Officer at Morphisec. Download the full eBook here.

In the arms race between cyber attackers and cyber...

Read More
Posted by Omri Dotan on March 11, 2016

Last week, Morphisec officially came out of the cyber security closet at the RSA Conference in San Francisco. It was a great opportunity to hear some impressive speakers, network with like-minded peers and take the Morphisec solution out for its...

Read More
Posted by Morphisec Team on December 20, 2015

Explosive news about vulnerabilities found in FireEye's security software are hitting the headlines. ZDNet, Ars Technica, PCworld and more reported about the findings by the Google Project Zero researchers. First, let’s give kudos to FireEye for...

Read More