Topics
Topics
The field is empty
Aviv Cohen

CMO at Pentera

10 articles by this writer

Password Security Tips: How to Create a Stronger Password

Would you believe that 49% of all data breaches involve passwords? The Verizon Data Breach Investigations Report highlights that stolen or weak passwo...

Why Pay a Pentester? The Shift to Automated Penetration Testing

The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against the gran...

Tackling Cloud Security Challenges

As much as we love the cloud, we fear it as well. We love it because cloud computing services of Amazon, Azure, and Google have transformed operati...

Lessons from the SolarWinds Supply Chain Attack

True Story, Verbatim “Let’s stop the test here, and continue tomorrow,” came unexpectedly from the CISO of a multi-billion technology company...

Ensuring Security Against Ransomware Threats

Ransomware is a topic that regularly comes up when I speak to CISOs and information security leaders, understandably so as recent reports have highl...

Cyber Hygiene Best Practices for Remote Work

There is no precedence to the unconscionable way hackers exploit human distress during these times. Albeit a few hacker groups “swore” on paper they...

Remote Penetration Testing: How It Works & Why It Matters

Introduction Traditionally, these assessments required on-site engagements with security professionals working within the corporate network. Howeve...

How Automated Pentesting Mimics Hacker Techniques

Computer-room heroism or what I like to refer to as “Cyber Patriotism” is told in the compelling story of The Imitation Game.  Based on the book “Th...