Skip to main content
Skip to footer
Solutions
Partners
Resources
Contact Us
Book a demo
Solutions
Partners
Resources
Contact Us
Tag:
security
Case study – preventing Malgent trojan horse
12/09/2024
Intro Yesterday (September 12th, 2024) our Active Endpoint Deception platform prevented a new variant of Malgent trojan horse that was…
Recent attacks on European organizations
24/11/2021
Deceptive Bytes' research team detected in recent days a wave of attacks on European organizations, while the attacks are not…
Overcoming The Challenges Of Managing Endpoint Protection Solutions
28/10/2021
More and more firms are turning to remote working and, while doing so, expect staff members to remain on top…
Why ML/AI is not cyber and endpoint security savior
28/01/2019
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to…
Why cyber security awareness is important for everyone, not just for experts
12/09/2018
There are several reasons why cyber security experts urge people to change their thinking when it comes to security... We…
Improve your security without installing additional security software
18/12/2017
There are various security measures you can take in order to protect your endpoint, some might be heavy on the…
Skip to content
Open toolbar
Accessibility tools
Accessibility tools
Enlarge text
Enlarge text
Reducing text
Reducing text
Shades of gray
Shades of gray
High contrast
High contrast
Negative contrast
Negative contrast
Light background
Light background
Links Underline
Links Underline
Readable font
Readable font
Reset
Reset