NEW ON OUR BLOG
October 17, 2017
Read
NEW ON OUR BLOG
April 24, 2017
Read
NEW ON OUR BLOG
April 6, 2017
Read
Recent blog posts

Coronet offers protection against KRACK

Coronet’s SecureCloud, the platform that offers end to end outside the perimeter security, confirms that it is the first company to offer protection against KRACK. In a paper written by Belgian researchers, a vulnerability in WPA and WPA2 protocols was published in which an attacker executing a multi stage attack could circumvent the built-in protections (…)

Keren, October 17, 2017
No tags

How To Avoid Getting Hacked On Wireless Networks

In every public venue, people use Wi-Fi accessible smartphones, tablets and laptops for both work and leisurely activities. The workplace has expanded beyond the four walls of the office to anywhere its network can be accessed via a Wi-Fi signal. Of course, this is a double-edged sword, due to the numerous methods by which cyber (…)

Dror Liwer, April 24, 2017
No tags

What’s Government’s Role In Protecting Wireless Networks?

Both private businesses and governmental agencies are increasingly concerned about the mounting threats to wireless devices and networks. However, government approaches to dealing with the problem vary dramatically. From India, through the United States to the United Kingdom steps have taken range from full blown bans on use of wireless devices in the government workplace (…)

Dror Liwer, April 6, 2017

What Dangers Lurk In Your Wireless Network?

Companies across the spectrum are already familiar with a wide range of cyber threats, including; DDoS attacks, phishing email schemes, ghostware and cloud jailbreaking among many others, because these are the ones the media is quick to pick up on. However, there is a lack of awareness regarding a host of wireless network attacks that (…)

Dror Liwer, March 9, 2017

Why Your BYOD Policy & Compliance Is Failing

  In recent months, the debate over the future of BYOD has intensified. On the one hand, we really don’t need Gartner to tell us what we are already witnessing —  that more than half of all businesses will require employees to bring their own device by the end of 2017; while on the other (…)

Dror Liwer, February 28, 2017

How to Balance Wireless Network Security With the Thirst for Increased Connectivity

With workers relying more than ever on mobile devices to provide quick access to information, BYOD and BYON have become as ubiquitous and as necessary as office furniture. Yet, even though the “Bring Your Own” approach has revolutionized business, many companies still have a pre-revolutionary view to network cybersecurity. Companies still place great emphasis on (…)

Dror Liwer, February 7, 2017

How Good Wireless Visibility Can Beat the Rogue Access Points

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even an office building and it’s impossible to miss all the smartphones, tablets and laptop computers. Just about everyone has a wireless device. But the downside to all these devices – and thus the downside to BYOD also – is a (…)

Dror Liwer, January 26, 2017

Cybersecurity Events Not to be Missed, Jan – June 2017

Cybersecurity professionals have enough to worry about without keeping track of the many annual industry trade shows. Well, don’t worry. Stay focused on the threats to your network and allow me to give you a quick rundown on the cybersecurity trade shows that are not to be missed in the first half of this year. (…)

Dror Liwer, January 19, 2017

Thought you were safe with VPN? Think again!

If you’ve been kicking back and basking in your wireless network security zone because you have the most robust VPN in place, this is your wakeup call. It has become increasingly clear that VPNs are not as safe or efficient as everyone thought they once were. It is easier than ever for hackers to hijack (…)

Dror Liwer, January 11, 2017
Load More
x