Bizety Three Year Anniversary

We’re excited to be celebrating our 3 Year Anniversary. It’s hard to believe that it’s been three long years. We published our very first post on December 3, 2013 titled “Akamai Expands Security Portfolio”. In three years time, we’ve published

Read More »

Cool Startup – Namogoo

Tel-Aviv based startup Namogoo is a cybersecurity company that protects against client-side attacks, a growing but under-the-radar threat that compromise a user’s privacy and affects their experience of a website. Namogoo is the first company to not only guard against

Read More »

Cool Startup: Aqua Security

Software containers are becoming a major part of application development due to their ability to divide applications and place them on various physical and virtual machines. Containers offers flexibility, easier workload management, and aids developers in moving essential code/library tools

Read More »

CDN DDoS Mitigation SuperPoP Architecture

The 1Tbps DDoS attack is a total game changer for the edge security business model. For starters, we can throw away the idea of small companies becoming a DDoS mitigation service provider. Unfortunately, the DDoS mitigation business is going the

Read More »

The Convergence of WAN, CDN and Cloud Security

Convergence within the CDN industry began to take shape in the early part of 2015. This year, convergence will accelerate, reshaping incumbent business models and inspiring new ones in the process. The convergence is likely to echo the disruption that

Read More »

Interview with Eyal Hayardeni, CEO of Reblaze

Around the time that Akamai acquired Prolexic (circa 2013) and kick-started the Edge Security CDN segment, Reblaze came to market with an idea to revolutionize this new market space. Co-founders Eyal Hayardeny and Tzury Bar Yochay developed Reblaze to offer

Read More »

Fastly Taking Security To A Whole New Level

On February 25, Fastly shared the first part of their speaker series on security with Alex Pinto, Chief Data Scientist of Niddel and leader of the MLSec Project. The topic of his presentation was data science machine learning and security.

Read More »

Cisco ASA Next-Gen Firewall vs Cato Networks

Networking powerhouse Cisco is angry as heck, having watched former Pions like Arista Networks, Palo Alto Networks, and many others come in and eat their switching and security lunch. Cisco is hell bent on turning the page to a new

Read More »

Protecting IoT Against Man-in-the-Middle Attacks

One of the most successful methods for gaining control of sensitive user information (with the added benefit of less likely getting caught) is through Man-in-the-Middle (MiTM) attacks. In a man-in-the-middle attack, a third party pretends to be the server that

Read More »

Cool Startup: Digital Shadows

Digital Shadows is a cybersecurity intelligence startup that provides cyber situational awareness against cyber attacks, using big data analytics and threat intelligence platform that monitors a company’s sensitive information in cloud, mobile and social networking services. Using their Digital Shadows

Read More »
Scroll to Top