top of page
Skybox customers looking for a new solution? We’ve got you covered.


Malynnda Littky-Porath
Mar 18, 20243 min read
Resolving human error in application outages: strategies for success
Application outages caused by human error can be a nightmare for businesses, leading to financial losses, customer dissatisfaction, and...
2
1

Malynnda Littky-Porath
Jan 8, 20242 min read
Mitigating cloud security risks through comprehensive automated solutions
A recent news article from Bleeping Computer called out an incident involving Japanese game developer Ateam, in which a misconfiguration...
0
0


Tsippi Dach
Dec 20, 20238 min read
14 Step Checklist for a Flawless Network Security Audit
14 Step Checklist for a Flawless Network Security Audit If security policies aren’t periodically updated to meet modern threat demands,...
3
0


Tsippi Dach
Dec 20, 202310 min read
Can Firewalls Be Hacked? Yes, Here’s 6 Vulnerabilities
Can Firewalls Be Hacked? Yes, Here’s 6 Vulnerabilities Like all security tools, firewalls can be hacked. That’s what happened to the...
1
0


Tsippi Dach
Dec 20, 20239 min read
How To Reduce Attack Surface: 6 Proven Tactics
How To Reduce Attack Surface: 6 Proven Tactics Security-oriented organizations continuously identify, monitor, and manage...
0
0


Tsippi Dach
Aug 9, 202310 min read
How to optimize the security policy management lifecycle
Information security is vital to business continuity. Organizations trust their IT teams to enable innovation and business transformation...
1
0


Tsippi Dach
Aug 9, 20237 min read
How to improve network security (7 fundamental ways)
As per Cloudwards , a new organization gets hit by ransomware every 14 seconds. This is despite the fact that global cybersecurity...
6
0


Prof. Avishai Wool
Dec 6, 20224 min read
2023 Cybersecurity Predictions and Best Practices
As 2022 comes to a close, Professor Avishai Wool, AlgoSec Co-Founder and CTO, provides his top 5 issues organizations will need to be...
0
0

Prof. Avishai Wool
Feb 8, 20225 min read
Cybersecurity predictions and best practices in 2022
While we optimistically hoped for normality in 2021, organizations continue to deal with the repercussions of the pandemic nearly two...
0
0

Prof. Avishai Wool
Oct 6, 20212 min read
The Facebook outage and network configuration
Avishai Wool, CTO at AlgoSec, analyses the recent Facebook outage and the risks all organizations face in network configuration Social...
0
0

Tsippi Dach
Mar 31, 20213 min read
Stop hackers from poisoning the well: Protecting critical infrastructure against cyber-attacks
Attacks on water treatment plants show just how vulnerable critical infrastructure is to hacking – here’s how these vital services should...
2
0


Prof. Avishai Wool
Jun 14, 20163 min read
Checking the cybersecurity pulse of medical devices
Hospitals are increasingly becoming a favored target of cyber criminals. Yet if you think about medical equipment that is vulnerable to...
0
0


Kevin Beaver
Jul 16, 20152 min read
Top 10 common firewall threats and vulnerabilities
Common Firewall Threats Do you really know what vulnerabilities currently exist in your enterprise firewalls? Your vulnerability scans...
3
0


Matthew Pascucci
Jun 30, 20153 min read
How to Use Decoy Deception for Network Protection
A Decoy Network The strategy behind Sun Tzu’s ‘Art of War’ has been used by the military, sports teams, and pretty much anyone looking...
0
0
bottom of page