Gartner Analysts identify CDR as particularly useful

In the latest edition of Gartner's HypeCycle report on network security content cleaning technology ranks high on the priority matrix for network security.

Read More

CDR – The Necessary Complement to Antivirus

Cyber threats and successful attacks have been on the rise for years. Due to this, the inadequacy of antivirus is also becoming increasingly apparent. Antivirus often updates its systems, but its operation continues to lag behind; antivirus is built for yesterday's problem. Cyber criminals are taking advantage of this and their successful attacks have unfortunately been increasing for years.

Read More

What is CDR?

CDR is an emerging technology in cybersecurity. CDR stands for “Content Disarm & Reconstruction”. It ensures that malicious content (such as macros, embedded objects and actions) is removed from files. All this happens without affecting the usability and appearance of the file...

Read More

Cybercriminals no longer need to program

In recent years there has been a large increase in the sale of software for carrying out cyber attacks. This is ready-made software. The result is that a cyber criminal (in the making) no longer needs to master technical know-how to carry out cyber attacks. It has become almost as simple as pressing a button, like shopping in the supermarket.

Read More

These files are now more dangerous than Office documents

Archive files such as RAR and ZIP are now more often used for malware distribution than regular Office documents such as Word and PDF. The growth in the use of archive files last quarter alone is 11%. This puts archive documents in the first place. Cybercriminals know this and play to build trust through clever use of social engineering and legitimate-looking websites.

Read More

How employees are hacked through Linkedin

Every organization is aware of the potential dangers of opening emails and clicking on forwarded links. Where this awareness has been established for users of e-mail and web pages after years of awareness training, this awareness appears to be less present when using social media. That is a shame, cybercriminals seize their opportunity.

Read More