Over the last decade, cybersecurity has been focused on the challenge of securing increasingly vulnerable and complex architectures. The industry has made great advances in spotting and blocking attackers, but…
Our experts have looked at the 6 signs your email gateway might need replacing. Read our guide and squeeze more from your security budget for the exciting cyber projects we…
The digital transformations that had enabled many enterprises to stay afloat amid the Covid-19 health crisis also brought about major upheavals in cybersecurity, the impact of which was still widely…
Cybersecurity is an ever-evolving discipline. Attacks change, technologies come and go, processes adjust, new compliance mandates are regulated, and people are there to hold it all together. But none of…
The cybercriminal underground is host to a vast market of zero-day and N-day exploits, where the price for an exploit is often dictated by how long it has been out…
Business organizations who use Microsoft 365 are still responsible for ensuring end user compliance with data security and preservation of data in accordance with their compliance regimes. As such, organizations…
With four out of five consumers globally having received a scam message, it's fair to say that scams are on the increase, at the same time consumer awareness around scams…
With employees working remotely at higher rates, business data is increasingly at risk. IT administrators are now responsible for maintaining the same high level of security for data that's more…
Myth: My endpoint data is secure because I have anti-virus software. Myth: Online storage is an effective substitute for computer backup. Do you know what to look for in endpoint…
Buy Now, Pay Later (BNPL) financing has become hugely popular over the last few years. However, as BNPL grows as an industry, and providers expand their offerings, it is likely…
Cofense conducted a survey to examine the general public's perceptions of phishing attacks, including what they believe to be the top types of attacks, motives of attackers and who is…
NAIKON is a threat actor that has been active for more than a decade. The group focuses on high profile targets such as government agencies and military organizations in the…