Ekran System Blog

News, opinions, and industry insights

May 24, 2017

Probably, everyone can agree that stopping insider threats is not an easy task.  Various insider threat indicators help you to know where the potential threat is coming from, but this is only half of the battle.

Insider Threat Indicators

Before we fully dive into this topic, it is worth noting that you need much more than simply watching human behavior to identify insider threat. Reliable detection also requires a specific tools that will allow...

April 19, 2017

High profile cyber security incidents have always received a major coverage from the media and attention from the public alike. The latest highly controversial and very politically charged theft of emails from the Democratic National Committee is still a major topic of discussion, with investigations continuing on the highest level.

Top security breaches

However, the history of cyber security incidents affecting private companies and government...

April 10, 2017

Giving that authentication in general is the process of verification of that the user attempting to access certain end-points, data or functionality really is the person or entity they states to be, multifactor authentication is one of the general approaches or methods used to resolve this task.

Multi-factor authentication scheme

What is multifactor authentication and 2FA in particular?

What is NOT a two-factor...

March 23, 2017

Modern businesses face many challenges, not the least of which are associated with compliance. In theory, compliance regulations should help companies increase their cyber security and speed up the integration of best practices into their workflow.

Best cyber security practices

But in reality, trying to pass cyber security compliance audit can be quite confusing and overwhelming for many companies. While trying to meet existing regulatory standards, new...

February 22, 2017

Is your sensitive data secure? Best cyber security practices and ways to protect data are becoming the focus of discussion among companies in 2017.

Best cyber security practices

It takes only one look on the current headlines to understand why many companies are so concerned with IT security. Constant reports on state sponsored hacking attacks, denial of service attacks, ransomware and leaks by malicious insiders reflect the amount of cyber...

Pages