Apr 14, 2020
20 Free Cyber Security Solutions to Help You Through the COVID-19 Pand...

20 Free Cyber Security Solutions to Help You Through the COVID-19 Pandemic With the current COVID-19 pandemic, remote working has become an inevitable option for many organizations. While enterprises...

Learn More
Apr 10, 2020
Different Kinds of Impersonating: Phishing & Domain Squatting

Different Kinds of Impersonating: Phishing & Domain Squatting Phishing and domain squatting are commonly used by threat actors to achieve different kinds of goals against an organization. Among th...

Learn More
Feb 05, 2020
Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage

Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage On February 3rd, Microsoft Teams suffered outages following the expiration of one of its SSL certificates. Microsoft’s collabora...

Learn More
Nov 09, 2019
6 Benefits You Can Expect From Your Next Digital Risk Protection Solut...

6 Benefits You Can Expect From Your Next Digital Risk Protection Solution In case of a cybersecurity investment, it’s not always possible to satisfy the board by repeatedly saying “better safe than so...

Learn More
Oct 11, 2019
First Step to Zero Trust Strategy: Gain Visibility

First Step to Zero Trust Strategy: Gain Visibility Understanding the importance of Digital Asset Monitoring (DAM) is critical. Your adversaries spend the majority of their time doing discovery and map...

Learn More
Oct 01, 2019
Defending Against Persistent Threats

Defending Against Persistent Threats Threat actors follow a series of events-called the “cyber kill chain framework” from defense perspective-to successfully infiltrate a network and either exfiltrate...

Learn More
Sep 18, 2019
Responding to Risks of Finance Sector

Responding to Risks of Finance Sector Financial services companies in the world witnessed a sharp rise in data breaches which shows how the sector is under attack from threat actors. For example, in t...

Learn More