latest insights

seculert blog

Unsplashed background img 1

Seculert - A Comprehensive Platform

Learn how Seculert integrates with your existing security solutions. No hardware ...

read more

Seculert wins Global Excellence Award for innovation in enterprise security

Company recognized for its Advanced Threat Protection solution

Santa Clara, Calif., February 25, 2014 – Seculert, a leading advanced threat protection solution provider, announced today that the company has received the bronze award in the Innovations in Enterprise Security category at the 10th Annual 2014 Global Excellence Awards ceremony.

read more

On-Demand Webinar: Learn about recent developments in the world of advanced threats and how to address them effectively

On-demand webinar: Learn about recent developments in the world of advanced threats and how to address them effectively

read more

On-Demand Webinar: Nip advanced threats in the bud and protect your company’s reputation

On-demand webinar: Nip Advanced Threats in the Bud and Protect your Company’s Reputation

read more

Look to Israel for new cybersecurity ideas, innovation, partnerships and inspiration

But the most memorable parts of CyberTech 2014 were the multiple visits to the start-up pavilion, which included new cybersecurity companies that are challenging the status quo.

read more

Israeli defense computer hacked via tainted email: cyber firm

Hackers broke into an Israeli defense ministry computer via an email attachment tainted with malicious software that looked like it had been sent by the country's Shin Bet secret security service, an Israeli cyber security firm said on Sunday.

read more

A closer look at the Target malware, Part II

Yesterday’s story about the point-of-sale malware used in the Target attack has prompted a flood of analysis and reporting from antivirus and security vendors about related malware.

read more

A sneaky path into Target customers’ wallets

It was, in essence, a cybercriminal’s dream. For months, an amorphous group of Eastern European hackers had been poking around the networks of major American retailers, searching for loose portals that would take them deep into corporate systems.

read more

Cloud-Based Sandboxing: An Elevated Approach to Network Security

While the concept of sandboxing isn’t new, it wasn’t until a few years ago that it entered the mainstream network security vocabulary and enterprises began using on-premises sandboxing appliances to test suspicious executables for malware.

read more

Data Theft Trojan Defeats Security Sandbox

Security researchers have spotted a new variant of the Sazoora data-theft Trojan employing nifty tricks to avoid security sandboxes.

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2