Ethan Greenberg

Fortifying the Perimeter: Static Code Analysis and CDR in a Layered Defense Strategy

In the face of increasingly sophisticated cyber threats, a layered security approach is paramount. While Content Disarm and Reconstruction (CDR) offers a robust method for sanitizing document-based threats by reconstructing files to eliminate active content, its efficacy is limited when dealing with executable files. Executables, by their nature, cannot be reconstructed without altering their fundamental operation, …

Fortifying the Perimeter: Static Code Analysis and CDR in a Layered Defense Strategy Read More »

Removable Media Malware Scanning Kiosks: A Comprehensive Approach to NIST Media Protection

Removable media devices represent a significant attack vector for organizations. USB drives, external hard drives, and other removable media can introduce malware, facilitate data exfiltration, or compromise network integrity if not properly secured. The National Institute of Standards and Technology (NIST) Special Publication 800-53 Revision 5 addresses these concerns through various media protection controls, notably …

Removable Media Malware Scanning Kiosks: A Comprehensive Approach to NIST Media Protection Read More »

The Antivirus Multi-Scan Tradeoff: Striking the Right Balance

Antivirus (AV) solutions are the first line of defense against malware threats, offering essential protection against known attacks. Many organizations adopt AV multi-scanning, using multiple AV engines to increase detection rates and reduce reliance on any single vendor. But is more always better? This article explores the pros and cons of AV multi-scanning, the tradeoffs …

The Antivirus Multi-Scan Tradeoff: Striking the Right Balance Read More »

What’s the Difference Between Firewalls and Data Diodes?

As cybersecurity threats become more sophisticated, organizations must deploy the most effective security measures to protect their critical networks. Two commonly used technologies—firewalls and data diodes—serve distinct purposes in network security. Understanding their differences can help organizations choose the right solution for their security needs. Background: Firewalls vs. Data Diodes The term firewall originates from …

What’s the Difference Between Firewalls and Data Diodes? Read More »

Mastering Network Segmentation A Guide For It Security Teams: Secure Your Digital Infrastructure

In today’s increasingly complex and fast-changing cyber threat environment, network segmentation is crucial for effective security measures. When implemented correctly, it can significantly reduce the risk of attackers moving laterally within the network, limit the impact of any breaches, and improve overall network performance and manageability. However, achieving effective network segmentation requires a thorough understanding …

Mastering Network Segmentation A Guide For It Security Teams: Secure Your Digital Infrastructure Read More »

Gs Analyzer Meeting The Challenge Of Malicious Executables: Secure Your Digital Infrastructure

In cybersecurity, detecting and mitigating threats posed by malicious executable code within benign files is a significant challenge. The 2020 SolarWinds breach exemplifies the damage caused when trusted software updates are compromised, leading to widespread cyber intrusions across government and corporate networks. Malicious executables often remain undetected until activation, as seen in the SolarWinds incident, …

Gs Analyzer Meeting The Challenge Of Malicious Executables: Secure Your Digital Infrastructure Read More »

Avoiding Data Diode Disasters Common Pitfalls And Their Mitigations: Secure Your Digital Infrastructure

Data diodes are the go-to solution for securing and segmenting critical networks however, faulty implementation could introduce vulnerabilities. In this post, we’ll explore common pitfalls in data diode implementation – how attackers have taken advantage of them and what you can do to avoid such instances in your network. Configuration Oversights The most obvious and …

Avoiding Data Diode Disasters Common Pitfalls And Their Mitigations: Secure Your Digital Infrastructure Read More »

Strategic Technological Approaches To Minimize Supply Chain Vulnerabilities: Secure Your Digital Infrastructure

The modern supply chain landscape is a complex web of interconnected entities, spanning across borders and involving intricate digital and physical processes. While these supply chains facilitate global commerce, they also present inherent vulnerabilities and risks, especially in the realm of cybersecurity. In response to these challenges, organizations are increasingly turning to advanced technological strategies …

Strategic Technological Approaches To Minimize Supply Chain Vulnerabilities: Secure Your Digital Infrastructure Read More »

Gatescanner Mail Gateway Receives Cybersecurity Award: Secure Your Digital Infrastructure

The winners of the 20th Annual 2024 Globee® Awards for Cybersecurity were announced today with Sasa Software named second in the Email and Web Security category, and first in email security. Sasa Software submitted its innovative GateScanner Mail Gateway solution for the protection of enterprise email, which for the first time offers Content Disarm and …

Gatescanner Mail Gateway Receives Cybersecurity Award: Secure Your Digital Infrastructure Read More »

Ai Powered Malware Preventing The Unknown: Secure Your Digital Infrastructure

Malware developers are leveraging AI algorithms to automate and enhance various stages of the attack lifecycle, from reconnaissance to evasion. This results in stealthier and more targeted attacks that can bypass traditional security measures. Conventional security tools struggle to detect AI-generated malware due to its dynamic and polymorphic nature. As a result, network security teams …

Ai Powered Malware Preventing The Unknown: Secure Your Digital Infrastructure Read More »

Optimizing The Sandbox Recognizing And Addressing Limitations: Secure Your Digital Infrastructure

Sandbox technology, a crucial component in cybersecurity, grapples with intricate challenges that necessitate an in-depth understanding for effective mitigation. In this post we will review some approaches to meet current challenges facing this technology. Performance Overhead and Scalability Issues Sandbox environments often face challenges related to performance overhead and scalability. The process of analyzing potential …

Optimizing The Sandbox Recognizing And Addressing Limitations: Secure Your Digital Infrastructure Read More »

Safeguarding Medical Imaging Data Addressing The Orthanc Osimis Dicom Web Viewer Vulnerability: Secure Your Digital Infrastructure

Healthcare organizations rely heavily on DICOM (Digital Imaging and Communications in Medicine) technology for the storage and exchange of medical imaging data. However, a recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a critical vulnerability in the Orthanc Osimis DICOM Web Viewer, posing a significant threat to the security of medical imaging data. This …

Safeguarding Medical Imaging Data Addressing The Orthanc Osimis Dicom Web Viewer Vulnerability: Secure Your Digital Infrastructure Read More »

Addressing Security Risks in Digitally Signed PDF Documents

Digitally Signed PDF Banner 1011010 1100101 0110100 1110010 1001110 0101101 1010101 1100010 0111001 1010110 1100101 0110100 1011010 1100101 0110100 1110010 1001110 0101101 PDF Digitally Signed & Secure Authenticated • Encrypted • Verified VERIFIED✓ By Yakov Yeroslav, CEO One of the most formidable cyber threats today involves malicious actors exploiting trusted network channels to infiltrate organizations’ …

Addressing Security Risks in Digitally Signed PDF Documents Read More »

The Importance Of Central Management In Sheep Dip Kiosk Implementation: Secure Your Digital Infrastructure

USB drives, while convenient for data storage and transfer, can also introduce several inherent threats to computer systems and networks, such as malware and viruses, autorun exploits and firmware attacks. A commonly used security measure, known by the name “Sheep dip”, is the deployment of USB scanning kiosks. However, to truly maximize the effectiveness of …

The Importance Of Central Management In Sheep Dip Kiosk Implementation: Secure Your Digital Infrastructure Read More »

New Study From Cisa Cdr Reduces Risk Content In Files By 98: Secure Your Digital Infrastructure

New study from CISA: CDR reduces risk content in files by >98% In a recent study from the Cybersecurity and Infrastructure Security Agency (CISA) that was presented at RSAC 2023 [1], Tom Ruoff and Dr. Olga Livingston showed results of a pilot assessment model for anti-malware controls that tested three CDR solutions in a chained …

New Study From Cisa Cdr Reduces Risk Content In Files By 98: Secure Your Digital Infrastructure Read More »

New Threat In Rtf Files Cve 202321716: Secure Your Digital Infrastructure

Critical threat in RTF files (CVE-202321716) Microsoft recently announced a newly discovered vulnerability in RTF files that gives unauthenticated users access to remotely execute commands on host machines. An attacker could send a malicious e-mail containing an RTF payload that would allow execution of commands within the application that was used to open the malicious …

New Threat In Rtf Files Cve 202321716: Secure Your Digital Infrastructure Read More »

Sasa Software Wins Award For Medical Imaging Data Security Solution: Secure Your Digital Infrastructure

Sasa Software Wins Award for Medical Imaging Data Security Solution February 26, 2023, Tel Aviv ‘People and Computers’, the leading Israeli IT portal, has announced its winners for the 2022 ‘Excellence in Computing’ competition, naming Sasa Software as an ‘IT Awards’ winner in the Command & Control category, for the new GateScanner Imaging Gateway that combines …

Sasa Software Wins Award For Medical Imaging Data Security Solution: Secure Your Digital Infrastructure Read More »

SVG images – the hidden threat your anti-virus can’t see

SVG images – the hidden threat your anti-virus can’t see A new type of file-based attack is spreading quickly, cleverly circumventing standard detection-based protections. This method of attack employes malicious emails with HTML attachments that include embedded, base64-encoded, SVG images. SVG images can, by design, include Javascript tags, and these script tags are now being …

SVG images – the hidden threat your anti-virus can’t see Read More »

Hacking For The Millions The Dark Side Of Chatgpt: Secure Your Digital Infrastructure

Hacking for the Millions: The dark side of ChatGPT Hacking just got a lot easier. With ChatGPT, even novices can craft cutting edge malicious code with the power of an AI knowledge base. ChatGPT, which stands for Chat Generative Pre-trained Transformer, is a chatbot developed by OpenAI. Launched in November 2022, it has been heralded …

Hacking For The Millions The Dark Side Of Chatgpt: Secure Your Digital Infrastructure Read More »

Blocking The Raspberry Robin Usb Worm: Secure Your Digital Infrastructure

Blocking the Raspberry Robin USB Worm The Microsoft Security Threat Intelligence team recently reported the discovery of activity showing that the Raspberry Robin worm is now part of a complex and interconnected malware ecosystem with links to other malware families and alternate infection methods beyond its original USB drive spread. The investigators found that Raspberry …

Blocking The Raspberry Robin Usb Worm: Secure Your Digital Infrastructure Read More »

Sasa Software Named Top Infosec Innovator For 2022: Secure Your Digital Infrastructure

Sasa Software named winner of ‘Top Infosec Innovator’ for 2022 TEL AVIV, OCTOBER 27, 2022 – SASA SOFTWARE the cybersecurity industry’s leading provider of Content Disarm and Reconstruction (CDR) network security solutions today announced that is has been named a winner in the Top InfoSec Innovator Awards for 2022. Sasa Software competed against many of …

Sasa Software Named Top Infosec Innovator For 2022: Secure Your Digital Infrastructure Read More »

Scroll to Top
Scroll to Top

CONSULT WITH OUR CONTENT SECURITY EXPERTS