Category Archives: Blog
Compliance Made Easy with Powerful Password Management
Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]
13
Mar
Mar
Inspiring Inclusion in Cyber Security on International Women’s Day
To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]
07
Mar
Mar
Enhance Email Security and Deliverability with DMARC
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]
31
Jan
Jan
World Data Protection Day 2024: Latest Developments in Data Privacy
As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]
25
Jan
Jan
From Social Engineering to AI Powered Threats: Part 1 2023 in Review
In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips
In this blog post, we asked our experts to rank the most common cybersecurity measures [...]
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024
In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]
20
Dec
Dec
Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X
This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]
22
Nov
Nov
Cyber Crime – Google Search Engine Result Poisoning
Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]
10
Nov
Nov
How a 24/7 SOC service can help with compliance for NIS2 and DORA
One of the key requirements of NIS2 is that organisations must have a process for [...]
24
Oct
Oct