Author Posts: Eran Cohen

Hostile by definition: Thoughts on Zero Trust Security – and its pitfalls. Part 1

(Note: see part two of our Zero Trust blog posts ) It’s a common question after a major breach: did you...

Transitioning applications to the cloud doesn’t have to mean sacrificing security, visibility or control

A CISO recently told us that despite having an impressive array of cybersecurity solutions during their transition to the cloud,...

Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

It’s increasingly difficult and more complex to be an effective buyer of security products today. Messaging and content overlaps are...

How to Use Identity, Behavior and Risk to Prevent Compromised Credentials

Identity, Behavior and Risk. Identity, Behavior and Risk. Almost like a mantra. Think about it for few seconds. Identity, Behavior...

Getting the Most out of a Security Product POC

Vendors, especially in the over crowded security space, often must help buyers justify their investment. But what happens when there...