Welcome!

Cyber Talks is a series where we share real stories, practical insights, and proven tips - all based on our experts' cyber experience and knowledge.

hero image

Watch Our Cyber Experts

A Look into Common BUT Rare Vulnerabilities Found play-icon
Kenny On and Chen Levy

A Look into Common BUT Rare Vulnerabilities Found

Join our experts as they dive into Recon and information harvesting techniques, MFA issues, and divulge stories from their very own experiences.

Eps. 8 | 23 Min

New Badge
Women's Day Special play-icon
Daniel Gal, Shani Peled and Michal Goldshtein

Women's Day Special

Our panel of highly skilled women discuss the challenges posed by an excess of security measures, the benefits of a purple team approach, and offer unique insights from their own experiences as women.

Eps. 7 | 19 Min

How Can You Avoid Social Engineering Attacks? play-icon
Yigal Van-Dongen and Nafthali Elazar

How Can You Avoid Social Engineering Attacks?

What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.

Eps. 6 | 14 Min

Efficient Techniques for Quantifying Risk  play-icon
Inbar Ries and Nimrod Partush

Efficient Techniques for Quantifying Risk

Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.

Eps. 5 | 21 Min

Why is Threat Intelligence Important for EVERYONE? play-icon
Lionel Sigal and Lior Bar Lev

Why is Threat Intelligence Important for EVERYONE?

Why should every CISO integrate threat intelligence into their security plans? Listen to our experts delve into how accurate intel can save you both money and effort.

Eps. 4 | 17 Min

Why is DMARC So Important? play-icon
Tal Memran and Nafthali Elazar

Why is DMARC So Important?

Are you falling victim to the most common social engineering attacks? Listen to our experts’ advice on the best way to address this issue.

Eps. 3 | 5 Min

Are You Making Mistakes in Your Application Security? play-icon
Gil Cohen

Are You Making Mistakes in Your Application Security?

Are your developers doing what they should to make your apps secure? Listen to our application security expert address your most critical issues.

Eps. 2 | 8 Min

How Does One Gain a More Mature Security Posture? play-icon
Max Shlochiski

How Does One Gain a More Mature Security Posture?

Your mitigation plan should consider more than just vulnerabilities and technical details. Find out which tools can be the most effective.

Eps. 1 | 7 Min

Read Our Cyber Experts' Blogs

Connect with us