Category Archives: Blog

CISO as a Service – A Trusted Partnership in the Making

Introduction Over the last few years, cyber threats have evolved significantly, becoming more sophisticated and [...]

IT Asset Management for Education Providers

Education providers and third level colleges have a unique responsibility to safeguard the personal data [...]

Understanding DORA, NIS2 and CER

The EU is fighting back against cybercrime and protecting critical infrastructure with some new legislation. [...]

Everything you need to know about Credential Stuffing

What is Credential Stuffing? Credential stuffing is a type of cyber-attack in which an attacker [...]

The Differences Between Penetration Testing and Vulnerability Scanning

The Differences Between Penetration Testing and Vulnerability Scanning The key difference between a penetration test [...]

Security Awareness Training for Higher Education: Safeguarding Educational Data

Security Awareness Training for Higher Education Security awareness training is a vital component of safeguarding [...]

The 4 SOC Solutions IT Buyers Need to Know

As the list of cybersecurity acronyms and their functionalities, what cyber security tools are truly [...]

Our Recommended Cybersecurity Podcasts

Whether you want to stay up to date with cyber trends or learn the InfoSec [...]

4 Affordable Ways to Protect your Business from Cyberattacks

Cyber security is one of the most important topics in today’s business environment as cyberattacks [...]

Cybersecurity Focus Special Report from The Irish Times

In Cybersecurity Focus special report, the Irish Times, CommSec and others look at how everyone [...]