Our Blog
Datto. Top 20 Most Common Hacker Behaviors
When the OWASP Top 20 Vulnerabilities was first published it revolutionized our industry’s approach to…
5 minutes read
SEP sesam Jaglion. Strong. Elegant. Adaptable
SEP sesam version Jaglion – the hybrid of jaguar and lion symbolises the combination of…
4 minutes read
Datto. Conti Ransomware – How it Works and 4 Ways to Protect Yourself
What is Conti Ransomware? Conti is a ransomware-as-a-service (RaaS) affiliate program, first appearing in early…
7 minutes read
Sophos. Optimizing Breach Prevention: Stop Them Before They Get In
In sports, there is a saying that if the opponent cannot score, they cannot win….
6 minutes read
Sophos. Optimizing Breach Prevention: Stop Them Before They Get In
In sports, there is a saying that if the opponent cannot score, they cannot win….
6 minutes read
Array. Top 5 Web Application Security Practices That Can Save You from Attacks in 2022
On May 7, 2021, the largest oil pipeline system in the US suffered a major…
12 minutes read
Sophos. Five Tips to Better Protect Yourself During the Current Russia-Ukraine Crisis
The current Russia-Ukraine crisis is unprecedented. One aspect of the current crisis is the very…
6 minutes read
Why Sophos ZTNA is better
Sophos ZTNA provides a number of advantages over remote-access VPN – enabling remote workers to…
3 minutes read
The New Normal in Cybersecurity: Exploring the Top Three 2022 Predictions (Part 2)
In The New Normal in Cybersecurity Part 1, we examined three leading trends in the cybersecurity…
8 minutes read
The New Normal in Cybersecurity: Examining the Top Three 2021 Trends (Part 1)
Τhe past year has shown organizations that uncertainty and a transformed reality are the new…
8 minutes read