Kate MacLean
• 3 minute read
View blog >
Businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices. Find out what's up in Europe.
Negisa Taymourian
• 3 minute read
View blog >
Phishing Phishers usually masquerade as a trustworthy entity in an electronic communication. That’s probably why it accounts for 90% of data breaches.
Rachel Ackerly
• 3 minute read
View blog >
53% of midmarket businesses have experienced a security breach — yet midmarket companies investigate only 55.6% of security alerts - read more in this blog.
Rachel Ackerly
• 2 minute read
View blog >
DoH (DNS-over-HTTPS) can increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks.
Adam Callis
• 2 minute read
View blog >
Cisco Umbrella will deprecate support for all TLS / SSL versions prior to version 1.2 on March 31st, 2020.
Josh Pyorre
• 2 minute read
View blog >
in part two of our phishing roundup, we're going to look at trending brands targeted in phishing attacks over the past three months.
Phanikumar Dharmavarapu
• 3 minute read
View blog >
Shyam Sundar Ramaswami
• 5 minute read
View blog >
Learn some of the techniques hackers use to embed malware in jpgs, how to identify it and how to keep yourself protected!
Jennifer Liou
• 4 minute read
View blog >