BLOG

Learn What's New With Us And In Cyber Security

Deceptive Bytes’ interview to CyberNews

Hen Lamay, Deceptive Bytes: “every organization should review its cybersecurity posture to make sure it can prevent, detect, and recover from a cyberattack” Today’s cyber threats are very different from

Recent attacks on European organizations

Deceptive Bytes’ research team detected in recent days a wave of attacks on European organizations, while the attacks are not that sophisticated, they employ social engineering to make users run

Why ML/AI is not cyber and endpoint security savior

Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now

CONTACT US

Request a free trial or send us a message

Let's get in touch

Request a demo or send us a message