Author Posts: Eran Cohen

Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

It’s increasingly difficult and more complex to be an effective buyer of security products today. Messaging and content overlaps are...

How to Use Identity, Behavior and Risk to Prevent Compromised Credentials

Identity, Behavior and Risk. Identity, Behavior and Risk. Almost like a mantra. Think about it for few seconds. Identity, Behavior...

Getting the Most out of a Security Product POC

Vendors, especially in the over crowded security space, often must help buyers justify their investment. But what happens when there...

Reduce Harm by Refocusing on the Basics

Full disclosure: I wasn’t physically at BlackHat 2017. But my colleagues who attended told me about the keynote by Alex...

QakBot, Stop Playing with my Active Directory!

Really, it’s not just me saying that Active Directory is the crown jewel. It's actually them, the hackers, that de...