Mendy Newman

Mendy is the Group CTO of Ericom's International Business operations. Based in Israel, Mendy works with Ericom's customers in the region to ensure they are successful in deploying and using its Zero Trust security solutions, including the ZTEdge cloud security platform.

FTC Issues Cybersecurity Warning for QR Codes featured image

FTC Issues Cybersecurity Warning for QR Codes

QR codes on ads are a simple way to grab potential customers before they move on. No wonder cybercriminals are using QR codes, too.

Read More
AI is Making Unmanaged Devices More Dangerous featured image

AI is Making Unmanaged Devices More Dangerous

Unmanaged devices are a growing concern for many organizations. AI-enabled zero day attack creation is set to increase this and other threats.

Read More
Stop Phishing to Prevent Up to 90% of Security Breaches featured image

Stop Phishing to Prevent Up to 90% of Security Breaches

Given the enormous sums being spent on phishing training, there are many studies that attempt to evaluate the effectiveness of the training. Many have found that it can't transform users into a reliable phishing defense force.

Read More
Playing for Keeps: Hackers Target Gaming and Gambling featured image

Playing for Keeps: Hackers Target Gaming and Gambling

Understand why attacks on gaming companies are on the rise and read about solutions that can help protect web-based games from attack.

Read More
Regulated Industries and Shadow IT Headaches featured image

Regulated Industries and Shadow IT Headaches

For organizations in highly regulated industries, like financial services, Shadow IT poses a double threat, with us exposing them to compliance risk as well as breaches and cybersecurity risk.

Read More
It’s Time to Stop Relying on Yesterday’s Cybersecurity Tools featured image

It’s Time to Stop Relying on Yesterday’s Cybersecurity Tools

Unfortunately, enabling WAFs to identify new zero-day threats doesn't go far enough to reliably protect web apps from threats.

Read More
mr. d0x Goes Phishing featured image

mr. d0x Goes Phishing

Users are falling for new phishing attacks that are using fake sign-in forms, demonstrating (yet again) that enterprises must protect their users from phishing, instead of depending on users to protect themselves.

Read More
Can You Trust That Contractor’s Device? Cybersecurity for the Gig Economy featured image

Can You Trust That Contractor’s Device? Cybersecurity for the Gig Economy

Freelancers and 3rd party contractors often need access to your networks, software and cloud apps. But contractors' unmanaged devices pose a serious risk to your organization.

Read More
Protect Users and Networks from Malware Hidden in Images and Attached Files featured image

Protect Users and Networks from Malware Hidden in Images and Attached Files

RBI stops steganographic attacks, in which malware is concealed within the code of images or other presumably innocent content, in ways that AV/firewalls cannot detect.

Read More
Preventing Cyberattacks by Blocking Hacker Reconnaissance featured image

Preventing Cyberattacks by Blocking Hacker Reconnaissance

Savvy cybercriminals do careful reconnaissance to gather info about vulnerabilities in a target’s systems before launching a full-on attack.

Read More