Moving Your Business to the Cloud? Cybercriminals are Hot on Your HeelsAlthough cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... BLOG Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
Moving Your Business to the Cloud? Cybercriminals are Hot on Your HeelsAlthough cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
BLOG Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in... The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in... MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in...
The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Latest Credential Data Breaches and What to Do to Not Get Compromised? May 25, 2021 According to Verizon’s 2021 Data Breach Investigation Report, the median data breach costs companies over $21,000 with some numbering in...
MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast...
Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...