Topics
Topics
The field is empty
Aviv Cohen

CMO at Pentera

9 articles by this writer

Tackling Cloud Security Challenges

As much as we love the cloud, we fear it as well. We love it because cloud computing services of Amazon, Azure, and Google have transformed operati...

Lessons from the SolarWinds Supply Chain Attack

True Story, Verbatim “Let’s stop the test here, and continue tomorrow,” came unexpectedly from the CISO of a multi-billion technology company...

Ensuring Security Against Ransomware Threats

Ransomware is a topic that regularly comes up when I speak to CISOs and information security leaders, understandably so as recent reports have highl...

Cyber Hygiene Best Practices for Remote Work

There is no precedence to the unconscionable way hackers exploit human distress during these times. Albeit a few hacker groups “swore” on paper they...

The Benefits of Remote Penetration Testing

In an effort to contain the CoronaVirus and stop its expansion, countries all over the world have closed their borders. Enterprises globally are fas...

How Automated Pentesting Mimics Hacker Techniques

Computer-room heroism or what I like to refer to as “Cyber Patriotism” is told in the compelling story of The Imitation Game.  Based on the book “Th...

A worldwide cyber warfare

Those who know - rarely speak. Those who speak - rarely know. But those who know and speak - are rare. I had the honor and pleasure of being in the ...

Why Automated Pentesting is on the Rise

As people, we make do with what we have, but once a better tool is within our reach we adopt it without looking back. For centuries we had no flowin...