Category Archives: Blog

The Hidden Threats of Browser Extensions

Uncover the hidden dangers of malicious browser extensions lurking in your web browser. Learn how [...]

Making the Most of Your Penetration Test Report

A pen testing report offers more than just a list of vulnerabilities. This blog post [...]

Compliance Made Easy with Powerful Password Management

Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]

Inspiring Inclusion in Cyber Security on International Women’s Day

To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]

Enhance Email Security and Deliverability with DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]

World Data Protection Day 2024: Latest Developments in Data Privacy

As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]

From Social Engineering to AI Powered Threats: Part 1 2023 in Review

In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]

From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips

In this blog post, we asked our experts to rank the most common cybersecurity measures [...]

From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024

In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]

Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X

This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]