5 Key Factors for Selecting a Managed Detection and Response (MDR) Provider
With an increasing number of threats and vulnerabilities to contend with, businesses need all the help they can get to keep their...
5 Reasons to Replace your Managed Detection and Response (MDR) Service
Managed Detection and Response (MDR) services are a fantastic way to keep your business’ cybersecurity up to date and effective. However, there...
🚀 Launching Autonomous SecOps (Your Virtual, Algorithm-Driven Tier 1 SOC)
We are helping security teams go beyond individual file analysis to automate their entire Endpoint and Email alert triage processes with our...
Securing the Software Supply Chain
How to scope, plan, and execute an effective supply chain security initiative. Supply Chain is Latest Land Grab for Cyber Attackers Software...
Reimagining the Malware Analysis Experience
Itai Tevet, CEO of Intezer, shares the company’s vision for a simplified, consolidated malware analysis experience. Since its inception, Intezer has strived...
2019: A Year-in-Review
What an amazing year it has been for us at Intezer! The company nearly doubled in size, we added several new important...
Revealing the Origins of Software
Summary Nearly all cyber attacks require running code. Regardless of the attack vector, in order for an adversary to create any damage,...
Mitigating Emotet, The Most Common Banking Trojan
Recently, Proofpoint released a fairly surprising report, stating that Banking Trojans have surpassed Ransomware as the top malware threat found in email....