Category Archives: Blog
The NIS2 Directive Uncovered
Discover the essentials of the EU's NIS2 Directive and its impact on cyber security. Learn [...]
22
Jul
Jul
The Dark Side of AI: A New Era of Cyber Threats
Explore the dark side of AI in cybersecurity – from sophisticated social engineering scams to [...]
05
Jul
Jul
How Alert Monitoring Can Transform Your IT Security
Imagine hackers inside your network for a week before you even notice. That is the [...]
18
Jun
Jun
Engaging the Board to Build Cyber Resilience
Learn how to get board buy-in for cybersecurity initiatives by focusing on the business impact [...]
10
Jun
Jun
The Hidden Threats of Browser Extensions
Uncover the hidden dangers of malicious browser extensions lurking in your web browser. Learn how [...]
16
May
May
Making the Most of Your Penetration Test Report
A pen testing report offers more than just a list of vulnerabilities. This blog post [...]
11
Apr
Apr
Compliance Made Easy with Powerful Password Management
Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]
13
Mar
Mar
Inspiring Inclusion in Cyber Security on International Women’s Day
To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]
07
Mar
Mar
Enhance Email Security and Deliverability with DMARC
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]
31
Jan
Jan
World Data Protection Day 2024: Latest Developments in Data Privacy
As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]
25
Jan
Jan