empow’s patented intent-aware “mind-reading” platform automates malware detection and response to create next-generation security organizations. TEL AVIV, Israel, Sept. 28, 2017 – empow, a pioneering cybersecurity startup known for its innovative security abstraction and intent-based orchestration, today announced a partnership with Lastline Inc., a leader… Read More
Attackers always want the same things: to steal information, manipulate data, disrupt service with DoS attacks and use ransom to achieve their ends. But while in other industries the risks are financial and reputational, when it comes to health services and IoT connected devices, human lives are at stake. A hacker can be a murderer.
How can you know if a company is making real, valuable use of AI and ML, or if it is just tossing around the words to try and make an impression? Here are some questions you can ask to help assess the real value of a product using AI and ML.
We need an ecosystem that will treat siloed security tools as one defensive system, from detection and identification, to investigation of the attack and then mitigation and remediation – how empow leverages AI to maximize cybersecurity ROI.
empow Named a 2017 “Cool Vendor” by Gartner in Monitoring and Management of Threats to Applications and Data
Vendors Selected for the “Cool Vendor” Report are Innovative, Impactful, and Intriguing [TEL AVIV, ISRAEL – June 15, 2017] – empow, a pioneering cybersecurity startup known for its innovative security abstraction and intent-based orchestration, has been recognized as a “Cool Vendor” in the Monitoring and Management of Threats… Read More
From Siri to Alexa to Watson, we are living in an AI world; it understands when we ask it to play our favorite song; it knows what book we will want to read next. AI can recognize the face of an individual, and the distinctive look of a cancer cell. Read More
By Avi Chesla “Ransomware” – it’s been screaming from headlines around the globe in the last 24 hours – almost a hundred nations attacked, the British health system paralyzed, likely billions in damages, and an already weary world had its sense of security shaken, yet again. Companies and organizations worldwide… Read More
The huge challenge presented by today’s attack campaigns – multi-stage attacks, with thousands of constantly evolving attack vectors – have led organizations to buy hundreds of security products in order to defend their networks. As exciting new technologies arise – advanced network and end point, anti-malware, network and entity behavioral… Read More
The Bigger Upside: Thoughts on the NY State Cybersecurity Requirements for Financial Services Companies
By Israel Aloni, VP Product On March 1st, new cyber-security regulations (23 NYCRR 500) for Financial Services companies went into effect in New York State. The regulations enforce certain minimum cyber-security standards for financial services companies, following the growing cyber threats that information and financial systems face. This is… Read More
Big Data. The phrase conjures a sense of next-gen problem-solving through sheer informational might. There is a whole lot of hype today around Big Data, leaving many to assume that it can only contribute positively, which means – the more data – the merrier. But in truth, Big Data is not making life any easier for security professionals. In fact, it is making them far less than merry.
RSAC 2017 – with its grand mix of speakers, exhibitors, and presentations – was a whirlwind of security news and innovation. While last year’s conference highlighted point products and tools centering around deception and end-point anti-malware, this year’s buzz tended towards more holistic security solutions, with collaboration, intent-based security and… Read More
empow’s unique approach listed among RSA 2017’s four disruptive cyber trends.
At the recent RSA cybersecurity conference, interoperability and cooperation were a common theme, but not everyone is taking it seriously..
empow honored as Editor’s Choice winner in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards in Security Abstraction Solutions Category
TEL AVIV, Israel – February 13th, 2017 – empow, a cybersecurity startup with a revolutionary approach for elevating enterprise security, announced today that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2017, has named empow the winner of the Editor’s Choice… Read More
Cybersecurity demands the impossible: that we look into the future to see where hackers are heading and what tactics they are brewing up. Of course there is no such crystal ball, so instead we focus on strategies hackers have carried out in the past and try to make predictions about future moves.
Innovative “Security Abstraction” Startup empow Secures $9M in Funding to Accelerate Breakthrough Product and Expand Offices to North America Cybersecurity Company’s New Security Particles™ Paradigm Helps Enterprises Make More of What They Already Have by Coordinating Existing Security Arsenals [TEL AVIV, ISRAEL – February 9th, 2016] – Cybersecurity startup empow… Read More
Research shows that 90% of New Year’s Resolutions fail. That’s not catastrophic if your goal is to lose 15 lbs., learn Mandarin, or spend less on lattes. But if you fail to live up to your Cybersecurity Resolutions, you could end up with the reputational whiplash and consequence cascade of Yahoo!, the DNC and all the others who fell prey to malicious hacks in 2016. Fortunately, the resolutions we’re proposing should be relatively simple to keep.
Check them out and join all of us in keeping 2017 a year safe in cyberspace.
The world of cybersecurity is becoming more and more complicated and – some say – almost unmanageable. This is due to the increasing volume of advanced attack campaigns and subsequent investment by organizations in more and more security tools – tools that are potentially effective, but are also trapped in silos that limit their capabilities. Each of these security tools has its own abilities, with different policy models and different alert languages.
The attacks that Hillary Clinton has blamed in part on her Electoral College loss to Donald Trump raise a critical question: will cyber-attacks targeting political organizations and prominent political players become the new norm?
In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.
With 2016 drawing to a close, what are the experts predicting about what we can expect to face in 2017?
Are the good guys well enough armed to handle next year’s level of cyber sophistication and severity?
What does the future of ransomware look like?
It’s time to consider whether proactive defense strategies exist in the realm of real battlefields.
The dangers in cyberspace in 2017 will only increase – most likely with even more sophisticated attacks such as advanced IoT DDoS invasions and ransomware campaigns, not to mention sensitive data hacks with a variety of end goals – from stealing our most critical corporate and personal data to stealing elections. Standard security solutions don’t seem to be working. What, if anything, can be done?
Security technologies must be provisioned with the right policy in order to ensure it complements the neighboring solution, and must also be activated in the right sequence.
A virtual security box transforms all security products and services into virtual security resources, decoupled from the underline security physical infrastructure.
Advanced attack campaigns are typically multi-vector, prolonged and adaptive to the defenses they encounter – unlike the defending side, which is inherently more rigid and structured around products and security solution silos.
Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.
When security technologies are bypassed, they cannot be “programmed” to detect and prevent the new attack behavior, the same attack that has breached their protection-space borders.
In order to be effective, security solutions must become more directly associated, in real-time, to cyber defense planning models.
In order to reap the greatest benefit from virtualization, SDN and NFV concepts, the control and data-plane functions of network security devices should be decoupled.