Israeli Cybersecurity Company Beats All Hackers

Cyber 2.0, a leading Israeli cybersecurity company, has launched a unique competition, try hacking the company’s defense systems and win NIS100,000 ($25,000). The competition, held recently, was open to hackers from across the globe and hundreds participated, simultaneously launching more than 1 million attacks. All however failed.

For the competition, Cyber 2.0 deployed a computer network that simulated a commercial company with the only protection being the company's defense system.  At the beginning of the competition, the hackers received a valid IP address within the network, which included the administrator password. 

Nevertheless, all of the hackers failed and according to the company, its software and systems were successful in blocking all of the attacks including viruses, ransom attacks, Trojan horses, information leakage and more. 

Cyber 2.0 said that it was the first company to put its system to such a test. "In a world where organisations have to make do with less than 100% protection, Cyber 2.0 comes and changes the rules of the game and provides absolute protection,” Hertzel Ozer, founder of Cyber 2.0, said.

Cyber 2.0 added that its system operates differently from other cyber companies since it operates on the basis of the mathematical principles of chaos, while other companies operate on the basis of biological models. 

JPost

You Might Also Read: 

Israel Is 15 Years Ahead in Cyber Warfare:

NATO Cyber War Games 2017: Czechs Win:
 

« Facebook’s Head Of Policy Quits Amid Data Misuse Controversey
Profile Of An Ethical Bug Hunter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

PiiQ Risk

PiiQ Risk

PiiQ Risk is the leader in social media risk analytics and scoring, delivering the only SaaS based social media intelligence and risk platform in the market.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.