Category Archives: Blog

Compliance Made Easy with Powerful Password Management

Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]

Inspiring Inclusion in Cyber Security on International Women’s Day

To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]

Enhance Email Security and Deliverability with DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]

World Data Protection Day 2024: Latest Developments in Data Privacy

As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]

From Social Engineering to AI Powered Threats: Part 1 2023 in Review

In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]

From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips

In this blog post, we asked our experts to rank the most common cybersecurity measures [...]

From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024

In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]

Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X

This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]

Cyber Crime – Google Search Engine Result Poisoning

Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]

How a 24/7 SOC service can help with compliance for NIS2 and DORA

One of the key requirements of NIS2 is that organisations must have a process for [...]