Eyal Aharoni

Iran’s Growing Role in Cyber warfare

On October 31, Major General Nadav Padan stated at the Reuters Cyber Security Summit that Iran has been launching an increasing number of attacks on Israel. Padan, who heads the IDF’s C4I and Cyber Defense Directorate, added: “Iran has been responsible for many of the thousands of daily[...]

Cyberattacks Are Evolving, and So Does Cybersecurity Technology

Organizations of all shapes and sizes are fighting the war against cyberattackers. As we have seen in recent years, cyberattacks are becoming more and more sophisticated, which makes it harder to detect and mitigate them. As cyberattacks evolve, so does security technology and the security[...]

How to Approach the Demanding 23 NYCRR 500 Regulation

In March 2017, the New York State Department of Financial Services (NYDFS) issued a new regulation, the much discussed 23 NYCRR part 500. Considered to be one of the harshest cybersecurity regulations ever to impact companies, it consists of a new set of standards and requirements for banks,[...]

How Cymulate Assists With ISO 27001 Certification and Compliance

The ISO/IEC 27000 family of standards was developed to help organizations with keeping their information assets secure. Of all the ISO 27000 standards, ISO 27001 is the best-known. It is a specification for an information security management system (ISMS), which is a framework of policies and[...]

Cymulate Can Help You Comply With GDPR

On May 25, 2018, the EU General Data Protection Regulation will come into force. It is the brainchild of ENISA (the European Union Agency for Network and Information Security) to stem the increasing number of reported data breaches, especially those relating to online systems and services. As the[...]

PCI Compliance with Cymulate - Keep Payment Data Safe

Merchants and companies of all sizes accept and process a multitude of credit card payments. On the downside, this provides a treasure trove for cybercriminals. They go after the millions of stored, processed and transmitted cardholder data. The table below shows some of the most profitable[...]

Helping Healthcare Providers To Keep Their Data HIPAA Compliant

During the first half of 2017, cybercrooks were at it again. According to the U.S. Department of Health and Human Services, the sad balance stands at 149 breaches affecting a total of nearly 2.7 million individuals.

Why a Breach and Attack Simulation Platform Should Be an Integral Part of Your Cybersecurity Arsenal

Cyber-attacks are making cyberspace an increasingly hostile environment for organizations. Despite having security solutions in place, defending against breaches is becoming more and more difficult, as recent cyber-attacks such as WannaCry have shown. Organizations are investing heavily in[...]

What CopyKittens Can Teach Us About Cyber-security

Thanks to the experts at ClearSky Cyber Security and Trend Micro, a highly professional cyber spy ring, known as CopyKittens, was exposed in an operation with the codename “Wilted Tulip”. The detailed report published on July 25th 2017, paints an alarming picture. CopyKittens has been active since[...]

Watering Hole Attack: "Don't Drink the Water"

A Watering Hole attack is an attack method in which the attacker seeks to compromise a specific group of end users by infecting websites that members of that group are known to visit. Watering Hole attacks have been adopted in attacks conducted by criminal enterprises and nation states alike. The[...]