Our Blog

Firewalls are Important, but they’re Not Enough

Firewalls are an essential part of your IT security infrastructure. In fact, in many cases, they are the foundation and rightfully so. It’s important to note, however, that the target has changed and so have the perpetrators. These days, the masterminds behind cyber-attacks are infinitely more sophisticated than they once were. Many will stop at

Read More »

Firewall: Start, Stop, Fail; The Red Zone

Firewalls are an essential part of your IT security infrastructure; they are the foundation. However, the target has changed, and most companies have not changed their focus. The current ideology is that hackers install agents on your network and let them do the work. They install them in the Red Zone. This is the weakest

Read More »

TTL time till live

TTL(Time Till Live ) Why Time Til Live (TTL) is a Critical Factor in Your Cyber Security Cyber-crime has become much more sophisticated than ever before. No longer are the threats simply a kid playing in the basement. The cyber war has become a billion dollar industry, netting malware companies and hackers millions. As corporate

Read More »

press release

FireDragon Breathes New Fight Against Cyber Attacks High-end, Lower Cost Cyber Security for Every Business PR Newswire SACRAMENTO, Calif., Aug. 12, 2015 SACRAMENTO, Calif., Aug. 12, 2015 /PRNewswire/ — After years of experience, research and frontline technology, Cyber Black Ops, Inc. announces the North American launch of FireDragon, the best answer to the growing cyber

Read More »

5 Myths of Virtualization Security: You May Be More Vulnerable Than You Think

  Myth No. 1: My Existing Endpoint Security Will Protect My Virtual Environment While most traditional endpoint security solutions are virtual-aware and provide some low levels of protection for virtual environments, this protection is too limited. It simply isn’t enough to cope with modern threats. Also, the performance brain, especially in large deployments, can cripple

Read More »

Anatomy of an Intrusion

Get our latest white paper from our CISO Sam Elkholy

Request a Demo

Join us for a private demo of FireDragon and see how it can protect your network

Sign up to our Newsletter

Get tidbits of helpful information on how to protect your network.