Our Top 5 LinkedIn Cybersecurity Influencers - 2020

    The cybersecurity landscape requires a keen understanding of the dark web, and how it operates.  It needs an obsessive interest in hackers who launch...
    Read More

    Our Top Vital 5 Cybersecurity Blogs to Follow in 2020

    The world of cybersecurity is filled with so much news that it is hard to filter out what is relevant and reliable from all the noise. These cybersecurity...
    Read More

    Air Crash Survivors - What They Did Right Lesson For Life

    An article in The Guardian about air crash survivors caught my attention. I have always been fascinated by planes and there is not a single flight journey...
    Read More

    Solving the COVID-19 VPN Security Risk Most Companies Are Missing

    Things are changing fast, as of March 17, 2020 an unprecedented number of people around the world were in actual lock down (across Malaysia, Spain, Italy,...
    Read More

    MazeBolt’s Security Blog is Now Among Top 100 Cyber Security Blogs

    MazeBolt is privileged to be on the list of Top 100 InfoSec Blogs, a ranking by Feedspot.  Feedspot’s expert editorial team reviews and adds pertinent...
    Read More

    Announcement of Monthly DDoS Defenses Newsletter Blog

    MazeBolt has been publishing a monthly newsletter since mid-2019. We have received an overwhelming response as subscriptions grew by 200% in the last 6...
    Read More

    EU and US Grant Method Patent to MazeBolt Technologies

    Enterprises now have the ability to maintain DDoS Vulnerabilities at under 2% ongoing. The technology that enables this is Proactive Feedback Module. This...
    Read More

    Dynamic Feedback Redefines DDoS Mitigation

    No Cyber Security Measure is Perfect In the cyber security cat and mouse game, between Cyber security professionals, on the one hand, and Cyber threat...
    Read More

    The Online Integrity of your Digital Transformation

    Nothing will ever be as it was.
    Read More

    Diamonds are Forever. So are DDoS Vulnerabilities.

    Cyber security vulnerabilities usually refer to weaknesses in software code that allow threat actors to take advantage of vulnerable programs, web...
    Read More