Our Blog
Automate Gatewatcher CTI for enhanced detection using Cyberm8 Automation Platform
By Cyberm8April 13, 2021
In this webinar, we discuss (and show) how Cyberm8 Automation Platform enhance detection of existing security devices by automating Gatewatcher CTI.
Cyber Crisis Management – How to Optimize the Automation of the Incident Response Process – Webinar Recording
By Cyberm8October 2, 2020
In this webinar, we discuss (and show) how Cyberm8 Automation Platform optimizes the automation of the Incident Response and Security Operation. This Webinar was hosted by Nacira Salvan, Founder of CEFCYS.
Keeping Up With Cloud IP/URL Changes
By Cyberm8July 13, 2020
As organizations are migrating more services to “AWS”, “Azure”, “GCP” (etc.) and usage of SaaS such as “Office365”, “Zoom”, “Webex” is increasing, maintaining a strict level of security for traffic traversing from the on-premise network to the cloud becomes a challenging task, even more than before (and especially without automation). IP Addresses of many of …
CVE-2020-5902 mitigation with Cyberm8 Automation Platform
By Cyberm8July 7, 2020
A new critical remote code execution vulnerability (CVE-2020-5902) was found in the configuration interface of the F5 BIG-IP devices. This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the Configuration utility, through the BIG-IP management port and/or self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or …
CVE-2020-5902 mitigation with Cyberm8 Automation Platform Read More »
Why do cybersecurity experts leave? (and how can we make them stay)
By Ilya PogrebDecember 23, 2019
Why do cybersecurity experts leave? As a particular skill shortage in the cybersecurity industry keeps relentlessly growing, the challenge of retaining existing security experts becomes more and more critical. While there are obvious reasons spurring employees to consider changing a position, such as a more generous compensation offer, career growth, better work-life balance, etc., there’s …
Why do cybersecurity experts leave? (and how can we make them stay) Read More »