Blog
Check Out Your Password
11.06.2024
In our latest cyber news review, we are going to share with you the key takeaways from recent studies on password management habits and ATO attacks.
Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?
13.10.2023
Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.
A Case in Point: You’ve got Mail
03.10.2023
Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.
Human Vulnerabilities in Cyber Security
03.07.2023
As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.
MSSP vs MDR
21.06.2023
MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.
Which sources should be controlled by the SIEM system first of all?
22.02.2023
It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.
Best Network Security Software
18.10.2022
What should you look for when choosing a provider of best network security software?
I resolve to… leave those security errors for good in 2021
27.12.2021
The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled
Why dismissed employees take revenge and what prevention measures to implement
17.12.2021
Revenge hacks and what prevention measures to take
Outsourcing the role of information security officer
23.04.2021
A piece of insight into infosec as an MSSP solution
(In) Secure digest: the science of information security, death cyberattack, and bank leaks
27.10.2020
We collected "classic" and non-trivial incidents reported by foreign media
Life changing risks pentesters take to help you boost security
27.07.2020
Conducting a penetration test on a courthouse and defending in front of a judge in the same building a few hours after – this is what happened to two pentesters working under contract.
Main aspects of information security
02.10.2019
Corporate security is not a new phenomenon. What we now understand as corporate security has existed since the emergence of trade. Merchants sought to protect their professional secrets from competitors in order not to lose profits.
Risk assessment matrices
05.09.2019
With the plethora of risks that accompany running a business, it is much more practical to have everything organized in written form or, better yet, in the form of diagrams for a concrete, concise representation of which risks the company faces as well as the severity of them.