Practical advice and insightful analysis from cybersecurity experts to help your business stays one step ahead of the threats.

Blog Banner Image
bottomshape

Featured Blog Posts

Cybersecurity in 2024 will see unprecedented breakthroughs and challenges. Massive ransomware attacks have already occurred, and Google’s influence on ad blocking rules is driving the…

Other Blog Posts

What is a Threat Vector? – Examples and Mitigations
28 Nov, 2022
What is a Threat Vector? – Examples and Mitigations
Threat vectors are entry points into computer systems and networks; Closing them will go a long way in preventing devastating...
Tips to Shop Safely During Black Friday and Cyber Monday
25 Nov, 2022
Tips to Shop Safely During Black Friday and Cyber Monday
While Black Friday & Cyber Monday can bring potential windfalls to shoppers, they can also do the same for cybercriminals...
What is Vulnerability Management?
24 Nov, 2022
What is Vulnerability Management?
The vulnerability & threat landscape is constantly expanding. To keep the bad guys out of your enterprise network and protect...
What is Incident Response in Cyber Security
16 Nov, 2022
What is Incident Response in Cyber Security
Learn more about what incident response is and how a security incident looks like and what the process is to...
Key Findings from the 2021 State of IT Security in Germany
02 Nov, 2022
Key Findings from the 2021 State of IT Security in Germany
The Federal Office for Information Security monitors the national and internal cybersecurity risk landscape, read the findings from their 2021...
Cyber heists – How two cryptocurrency platforms lost more than 1B Euro
09 Oct, 2022
Cyber heists – How two cryptocurrency platforms lost more than 1B Euro
In 2021 there were over 40 breaches at cryptocurrency exchanges with total losses of over 30 billion Euro.