Blog

odix’s Deep File Inspection driven security solutions now block malicious HTM/L attachments

2021-05-12T19:31:22+03:00May 12th, 2021|Blog|

The dev-op team from odix is pleased to announce that our full range of content disarm, and reconstruction solutions now have advanced static analysis...

IT Governance and Critical Infrastructure Protection: A Conversation with Dr. Oren Eytan And Denise Louie

2021-05-04T17:00:47+03:00May 4th, 2021|Blog|

On April 22, odix CEO Dr. Oren Eytan joined Denise Louie of the J.M. Smuckers company for a lively discussion on the importance of IT governance...

What are the Key Guidelines to Protect Critical Infrastructure from Cyber-Threats?

2021-04-27T16:53:40+03:00April 27th, 2021|Blog|

Critical infrastructure are defined as the assets, core systems, and strategic networks, both physical and digital, that are so esenetial to a nation that their incapacitation...

Load More Posts
Your information will never be shared.