top of page
Search


Nov 29, 20226 min read
Top 7 Phishing Attacks and How to Prevent Them
Social engineering, in the context of information security, consists of practices performed by hackers to manipulate users to take...
43 views
0 comments


Nov 26, 202212 min read
What is RDP and SSH?
Accelerated by the COVID-19 pandemic, remote work has seen a considerable boost in recent years, making many people understand what RPD...
16 views
0 comments


Nov 24, 20226 min read
Applying Zero Trust to PAM
The implementation of the Zero Trust-based security model has gained space in recent times, promoting the default approach of never...
13 views
0 comments


Nov 16, 20221 min read
Researchers warn of critical cybersecurity flaw in Oil and Gas sector
A new vulnerability was recently discovered by cybersecurity researchers, in systems used across oil and gas organisations. If it were to...
9 views
0 comments


Nov 14, 20222 min read
Three tips for choosing the right PAM solution
PAM was voted the #1 cybersecurity project by Gartner for two years in a row. This is because a PAM solution promotes cybersecurity in...
12 views
0 comments


Nov 10, 20222 min read
Protect Remote Access from Cyberattacks
The mass adoption of remote work has resulted in a significant increase in cyberattacks on business, witnessed by increased breaches in...
6 views
0 comments


Nov 2, 20223 min read
Better Threat Intelligence Improves SOAR Playbook Accuracy
First published by Dale Norris of ExtraHop Cybersecurity teams tasked with defending ever-expanding attack surfaces are facing staffing...
11 views
0 comments


Nov 1, 20226 min read
Everything You Need to Know about Voice Phishing Attacks
Vishing, also known as voice phishing, is a type of cyberattack wherein malicious actors use phone calls in an attempt to collect...
12 views
0 comments


Oct 31, 20223 min read
The best way to apply Account Lifecycle Management
What Is Account Lifecycle and Its Management? When a company hires a new employee or service provider, they need access to essential...
12 views
0 comments


Oct 25, 20224 min read
How AIOps supports Business Services
What are Business Services? Digital, and not traditional, business services are transformative business services that are technology...
22 views
0 comments


Oct 21, 20223 min read
How to Build Your AIOps Business Case
Organizations are looking to AIOps, or artificial intelligence for IT operations, as a solution to address these issues. But what does...
23 views
0 comments


Oct 19, 20224 min read
10 Steps to Mitigate Ransomware Attacks
Recent analysis indicates that the majority of businesses are taking the necessary precautions to establish fundamental cybersecurity...
9 views
0 comments


Oct 3, 20225 min read
What is Managed Detection and Response (MDR)?
(First published by Heimdal) The term managed detection and response (MDR) refers to a cybersecurity service that employs advanced...
23 views
0 comments


Sep 29, 20222 min read
XDR and Zero-Trust Strategy: The Whole is Greater than the sum of the parts
Shared by Joseph Vigorito We are often asked, what is the near-term future of Cybersecurity? While experts’ answers may differ, we...
5 views
0 comments


Sep 27, 20226 min read
How ISA 62443 protects industrial networks
This post was originally created by the senhasegura team The constant evolution of technology has enabled a series of innovations in the...
8 views
0 comments


Sep 14, 20225 min read
What is Ransomware?
Originally published by Jesse Munos of Extrahop Ransomware (ransom + malware) is a form of malware designed to allow malicious actors to...
17 views
0 comments

Sep 12, 20225 min read
What Is MLOps?
Across all industries, businesses are investing in applications and services powered by artificial intelligence (AI) and machine learning...
24 views
0 comments


Sep 6, 20222 min read
Cyberattack on InterContinental Hotels Group
InterContinental Hotels Group PLC (also known as IHG Hotels & Resorts) announced on September 5, 2022, that its network has been...
8 views
0 comments


Sep 1, 20222 min read
Hotel and Travel Businesses Attacked by Cybercriminals Using Bogus Reservations
The revitalization of the tourism and travel industry in 2022 prompted hackers to target hotel businesses, travel websites, and even...
8 views
0 comments


Aug 30, 20229 min read
How Has Robotic Process Automation Revolutionized Routine Execution?
Many people fear the elimination of jobs due to the adoption of Robotic Process Automation, since robots are able to perform tasks...
8 views
0 comments
bottom of page