Ran Tamir

CPO at Pentera

3 articles by this writer

Ransomware Readiness Strategies: How to Protect Your Organization

Ransomware Readiness Strategies: Are You Prepared? If this question is keeping you up at night, you’re certainly not alone. The threat is tangibly ...

Securing Credential Chain of Custody

In legal terms, the process of transferring evidence from one place to another is handled in a vigilant manner - the chain of custody. The purpose i...

Development of the First Automated Pentesting Platform

As VP of Product for Pcysys, I wanted to take this exciting opportunity to share with you a few tips and tales of our product evolution in the past ...