Contact Us
Cart
Item added Item updated Item removed No more products on stock You entered wrong value.

No products in the cart.

Cart
Item added Item updated Item removed No more products on stock You entered wrong value.

No products in the cart.

Blog

worried about recession and cybersecurity
Recession and the Role of Cybersecurity
A looming recession increases risks of attacks and scams. Why you should take the pro-active route and turn cybersecurity into an investment, not a cost.
Continue Reading
Case study: How a Man-in-the-middle attack caused over $700 million in losses!
Criminals exploited a patched vulnerability to deploy a man-in-the-middle attack to gain access to multiple databases of one of America’s biggest credit reporting agencies and steal the personal information of 147 million citizens
Continue Reading
Cybersecurity Awareness Month Special: Cybersecurity by the Numbers
This cybersecurity awareness month, et a clear picture of the digital landscape with 2023's most unsettling cybersecurity statistics: frequency of attacks, costs, contention time, most dominant threats, the role of employees, and much more.
Continue Reading
Annual Cybersecurity Training vs. Year-Round Cyber Security Awareness: Which is Better?
I have worked for not one, but three Fortune 500 companies, and the approach to cybersecurity training is typically as follows: Once the training is over, you drag yourself back to the office, and by the time you've sat down, it feels like half of all that information is GONE! A Snapshot of Traditional Cybersecurity […]
Continue Reading
Look-alike domains: a Sneaky Cybersecurity Threat
Deceptively simple and almost imperceptible: look-alike domains are designed to trick the user’s eyes by mimicking URLs of trustworthy websites. After luring the prey into a fake website, the foundation for a series of other cyber threats is established. The domain can be used to create a phishing website or even launch attacks such as […]
Continue Reading
The Evolution of the CISO 
The article discusses the changing role of the CISO, highlighting the importance of balancing business strategy and cybersecurity, and exploring future trends in the profession.
Continue Reading
The good old days: cybersecurity awareness used to be so much simpler
The article explores the evolution of cybersecurity awareness, highlighting how awareness strategies have needed to adapt to the increasing complexity and sophistication of cyber threats.
Continue Reading
Vetting third-parties: important for organizations, a game-changer for vendors
The article focuses on the importance of rigorous scrutiny of third parties by organizations and how this process is transformative for suppliers.
Continue Reading
usercartmagnifiercrossarrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram