Vicarius - Cyber Insurance Made Easy

There is no way to ignore three main trends in the field of cyber-security. Managed Security Service Providers (MSSPs) - The know-how of what are the right security needs is something you can't always find in a typical SME or SMB. Just like most of the things that require a high level of professionalism, a lot of companies choose to outsource these tasks to an external service provider. It's very common to find among MSSPs clients like hospitals with hundreds
- Vicarius - Cyber Insurance Made Easy

Read more

WannaCry? Vicarius is Ready for the Next One

A personal experience My first encounter with a 'Ransomware' threat had nothing to do with my workplace, but closer to my home. Among my friends and family, I’m considered the ‘tech guy’ (I guess some of you can relate). I wasn’t that surprised getting a late night text message from a friend of mine: 'Luckily' for him, he tends to get infected twice a month (a fascinating topic by itself) so aside from trying to educate him, I’
- WannaCry? Vicarius is Ready for the Next One

Read more

Vicarius is Disrupting the Not-So-Sexy Vulnerability Assessment Market

So lately people have been asking me: what is this thing you are working on at Vicarius and why are you folks standing out from all the other cyber security vendors out there? My two cents for that are: 1. Grouping all the cyber security products under one umbrella is completely wrong. Our industry is probably the most sub-segmented market around. 2. Vicarius is disrupting a traditional and compliance-driven segment. Our product is superior in so many ways that the
- Vicarius is Disrupting the Not-So-Sexy Vulnerability Assessment Market

Read more

Intelligence Gathering – from Reconnaissance to Exploitation

Back in the days as a security consultant, I was in charge of conducting various tasks such as security audits, security controls integration and more. The ones I enjoyed the most were penetration tests which demonstrate if and how can an attacker breach a target customer. Long story short, I was getting paid to break things so what is not to like? Most of the attacks have an upper limit in the form of time limitation. This limitation affects its
- Intelligence Gathering – from Reconnaissance to Exploitation

Read more

Malware - from A to Zero-day

Intro From the theoretical work of John Von Neumann up to Zeus, Stuxnet and Cryptolocker, the malware world had seen a lot of changes and different means of accomplishing malicious goals. Every consecutive year we can see an increase in the amount of detected malware, peaking this year alone to over 500 Million different malware samples collected worldwide. While there are many cyber solutions out there, the vast majority of them stuck in the everlasting cat-and-mouse game - detect a
- Malware - from A to Zero-day

Read more