Posts by Ofer Amitai
How to Protect Your Network Against a Ransomware Attack
Cyberattacks against mid-market and enterprise organizations are on the rise. From man in the middle (MitM), distributed denial-of-service (DDoS) and SQL injections, to zero-day exploits and phishing, cyberthreats are getting more sophisticated, more prevalent and more costly. But one type of cybercrime reigns supreme: ransomware. Not-so-fun facts about ransomware today: Ransomware cost the world $20 billion in 2021. That number is expected to rise to $265 billion by…
Read MoreThe Coronavirus & the Cloud – A Winning Combination for Hackers
Originally posted on People and Computers “The combination of changing work patterns due to the coronavirus, with the increasing migration to cloud environments, creates a new and significant challenge for corporate information security managers,” said Ofer Amitai, one of the founders and CEO of Portnox, explaining how it can be answered at the identification stage.…
Read MoreREvil Ransomware Attack Illustrates IT Systems Need for Epidemiological Investigation
Originally posted on CTECH Examining the REvil ransomware attack The recent REvil ransomware attack has revealed that our computer systems are vulnerable to unknown and surprising pathogens, similar to our vulnerability to Covid-19. The hackers claim that the attack penetrated more than a million workstations, and demanded about $70 million to unlock them. However, the…
Read MoreTo Fight Ransomware Hacks Drain the Cryptocurrency Swamp
Originally posted on Times of Israel These ransomware hacks, or kind of digital extortion – increasingly viewed as terrorism – would be impossible without the ability to move money around anonymously Last month, a cybercriminal group penetrated the Colonial Pipeline. This wasn’t just “another” one of those ransomware hacks, with privacy consequences and threats on…
Read MoreSASE & the Future of Network Access Control
The current enterprise network security practices focus on verifying the identity of the user and the device in a perimeter-less environment, where cloud-hosted technologies prevail in the enterprise and where remote sites include branch offices and employees working from home. In Gartner’s paper “The Future of Network Security is in the Cloud”, one of the…
Read MoreLast Mile Security: Why It’s More Important Today Than Ever Before
It’s official: perimeter security is old news. Thanks to the rise of cloud services, SASE architecture, and global pandemics, it’s time we discussed securing the “last mile.” Last mile security is a lot like a marathon – it’s lonely and hard to get to – but without it, you won’t get a medal at the…
Read MoreSetting up Secure Remote NAC through VPN & VDI
Any IT team can set-up remote network access with minimal guidance. Without the proper parameters, however, this remote access has the potential to be open to everyone – not just for those it was designed to serve. When setting up secure remote network access control, there are three components to consider: 1) application access, 2)…
Read MorePortnox Partners with Distology for Sole Distribution of Cloud-Delivered Network Access Control (NAC) Solution in United Kingdom & Ireland
Partnership Will Drive Increased Adoption of Portnox’s Cutting-Edge NAC Solution Purpose-Built for Large Distributed Organizations in the Region LONDON — Portnox, which supplies network access control (NAC), visibility and device risk management to organizations of all sizes, today announced that it has partnered with Distology for the sole distribution and resell of its cloud-delivered NAC-as-a-Service…
Read MoreControlling Network Access in an SD-WAN World
Why SD-WAN? Why Now? The rise of Software-as-a-Service (SaaS) and cloud services is resulting in decentralized data traffic flows, in turn rendering the traditionally expensive Mutliprotocol Label Switching (MPLS) inefficient for wide area network (WAN) transport. This has prompted a change in networking architecture and the means of controlling network access. The emergence of software-defined…
Read MoreGlobal leader in metals mining & manufacturing enhances network visibility & access control with Portnox CORE
The Truth About MAC Spoofing
The threat behind MAC spoofing When implementing any insurance policy, you need to start with estimating the level of risk, the probability of that risk, and the potential damage should that risk become a reality. One of the network risks that is often presented to demonstrate the ineffectiveness of 802.1x solutions is the ease of…
Read More