Here is my recent talk about Netflix, DevSecOps and Jenkins at the recent Impact event held here in Israel.

DevOps Security - How credentials can be exposed in DevOps environments where Jenkins is used.

The most common attack vector used by malicious actors to infiltrate and compromise organizations is the compromise of privileged credentials. The most significant breaches in the past 15 years are a solid proof for it.

In the presentation below I describe how hackers a...

Quick interview at the recent (2017) CyberArk Impact event in Israel.

October 12, 2017

It is fascinating looking at how information is being handled using massive data bases and data base technologies like Hadoop, and how information is being analyzed and monetized by companies like Facebook. It is even more fascinating looking at how information is bein...

In a blog posted under ISACA Now, I shared an analysis of two ransomware samples, a ransomware kill chain and a new and efficient approach to combat ransomwares based on the kill chain.

The image above is a screen shot of the game Undefined Fantastic Object Anime game t...

September 23, 2017

Research Coverage of Cyberark Labs for 2017

September 22, 2017

How the next APT might compromise government networks

July 31, 2017

How to defeat the new type of ransomwares that are spreading using zero days and crednetials to infect the whole network and  not only an infected endpoint. Here are  the slides presented @ BlackHat 2017.

Please reload

Featured Posts

Chaos!

April 27, 2016

1/4
Please reload

Recent Posts

November 15, 2017

September 22, 2017

Please reload

Follow Me
  • Facebook Basic Square
  • Twitter Basic Square
  • Grey Facebook Icon
  • Grey Twitter Icon
Contact me @:
This site was designed with the
.com
website builder. Create your website today.
Start Now