News

Stay up to date with our latest news and industry insights.

 
 

Leveraging AI To Maximize Cybersecurity ROI

We need an ecosystem that will treat siloed security tools as one defensive system, from detection and identification, to investigation of the attack and then mitigation and remediation – how empow leverages AI to maximize cybersecurity ROI. 

Read the full article

July 10, 2017

AI: The Good, The Bad and The Ugly

  From Siri to Alexa to Watson, we are living in an AI world; it understands when we ask it to play our favorite song; it knows what book we will want to read next. AI can recognize the face of an individual, and the distinctive look of a cancer… Read More

May 21, 2017

Ransomware Wake-up Call – What You Need to Know

By Avi Chesla “Ransomware” – it’s been screaming from headlines around the globe in the last 24 hours – almost a hundred nations attacked, the British health system paralyzed, likely billions in damages, and an already weary world had its sense of security shaken, yet again. Companies and organizations worldwide… Read More

May 13, 2017

Big Data: Noise, or Actionable Cyber Security Info?

Big Data. The phrase conjures a sense of next-gen problem-solving through sheer informational might. There is a whole lot of hype today around Big Data, leaving many to assume that it can only contribute positively, which means – the more data – the merrier. But in truth, Big Data is not making life any easier for security professionals. In fact, it is making them far less than merry.

Read more

March 12, 2017

The Dust Has Settled – Impressions from RSAC 2017

RSAC 2017 – with its grand mix of speakers, exhibitors, and presentations – was a whirlwind of security news and innovation. While last year’s conference highlighted point products and tools centering around deception and end-point anti-malware, this year’s buzz tended towards more holistic security solutions, with collaboration, intent-based security and… Read More

March 1, 2017

empow honored as Editor’s Choice winner in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards in Security Abstraction Solutions Category

TEL AVIV, Israel – February 13th, 2017 – empow, a cybersecurity startup with a revolutionary approach for elevating enterprise security, announced today that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2017, has named empow the winner of the Editor’s Choice… Read More

February 13, 2017

Cybersecurity: Learning from the Future

Cybersecurity demands the impossible: that we look into the future to see where hackers are heading and what tactics they are brewing up. Of course there is no such crystal ball, so instead we focus on strategies hackers have carried out in the past and try to make predictions about future moves.

February 11, 2017

empow Secures $9M in Funding

Innovative “Security Abstraction” Startup empow Secures $9M in Funding to Accelerate Breakthrough Product and Expand Offices to North America Cybersecurity Company’s New Security Particles™ Paradigm Helps Enterprises Make More of What They Already Have by Coordinating Existing Security Arsenals [TEL AVIV, ISRAEL – February 9th, 2016] – Cybersecurity startup empow… Read More

February 9, 2017

The CISO’s 2017 New Year’s Resolutions

Research shows that 90% of New Year’s Resolutions fail.  That’s not catastrophic if your goal is to lose 15 lbs., learn Mandarin, or spend less on lattes.  But if you fail to live up to your Cybersecurity Resolutions, you could end up with the reputational whiplash and consequence cascade of Yahoo!, the DNC and all the others who fell prey to malicious hacks in 2016. Fortunately, the resolutions we’re proposing should be relatively simple to keep.

Check them out and join all of us in keeping 2017 a year safe in cyberspace.

January 27, 2017

Understanding the Benefits of Security Abstraction

The world of cybersecurity is becoming more and more complicated and – some say – almost unmanageable.  This is due to the increasing volume of advanced attack campaigns and subsequent investment by organizations in more and more security tools – tools that are potentially effective, but are also trapped in silos that limit their capabilities. Each of these security tools has its own abilities, with different policy models and different alert languages.

January 9, 2017

Russia’s Election Hack is a Serious Threat to US Democracy

The attacks that Hillary Clinton has blamed in part on her Electoral College loss to Donald Trump raise a critical question: will cyber-attacks targeting political organizations and prominent political players become the new norm?

December 29, 2016

Zero to One Security Innovation

In today’s market, more does not mean better. We need security innovation that makes more of what the industry already has by turning what we have into what we need.

December 12, 2016

On the Third Day of Christmas

With 2016 drawing to a close, what are the experts predicting about what we can expect to face in 2017?

December 7, 2016

How Security Collaboration Will Prove Vital in 2017

The dangers in cyberspace in 2017 will only increase – most likely with even more sophisticated attacks such as advanced IoT DDoS invasions and ransomware campaigns, not to mention sensitive data hacks with a variety of end goals – from stealing our most critical corporate and personal data to stealing elections. Standard security solutions don’t seem to be working. What, if anything, can be done?

November 22, 2016

The Case for a Virtual Security Box

A virtual security box transforms all security products and services into virtual security resources, decoupled from the underline security physical infrastructure.

March 28, 2016

Why Advanced Attack Campaigns Like Security Silos

Advanced attack campaigns are typically multi-vector, prolonged and adaptive to the defenses they encounter – unlike the defending side, which is inherently more rigid and structured around products and security solution silos.

March 1, 2016

Why We Need Holistic Context-based Security Decisions

Now more than ever, context-based decisions have become a necessity. This is because the identification process of an advanced persistent attack campaign is all about putting events in the right context.

March 31, 2015

Contact Us

Please fill in your contact info
and we will get back to you soon.