Blog - SearchInform


Check Out Your Password


In our latest cyber news review, we are going to share with you the key takeaways from recent studies on password management habits and ATO attacks.

Risk assessment Personal data Human factor

Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?


Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.

Risk assessment Risk management Fraud

A Case in Point: You’ve got Mail


Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.

Risk assessment Investigation DLP

Human Vulnerabilities in Cyber Security


As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.

Risk assessment Risk management Third party



MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.

Risk assessment Risk management Compliance

Which sources should be controlled by the SIEM system first of all?


It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.

Risk assessment review

SIEM: Use Cases


We will examine more precisely top SIEM use cases.

review Risk assessment Compliance

Best Network Security Software


What should you look for when choosing a provider of best network security software?

Risk assessment Risk management

I resolve to… leave those security errors for good in 2021


The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled

Risk assessment Risk management Investigation

Outsourcing the role of information security officer


A piece of insight into infosec as an MSSP solution

Risk assessment Internal audit Cloud

(In) Secure digest: the science of information security, death cyberattack, and bank leaks


We collected "classic" and non-trivial incidents reported by foreign media

Risk assessment Devices Risk management

Life changing risks pentesters take to help you boost security


Conducting a penetration test on a courthouse and defending in front of a judge in the same building a few hours after – this is what happened to two pentesters working under contract.

Risk assessment Third party Investigation

Main aspects of information security


Corporate security is not a new phenomenon. What we now understand as corporate security has existed since the emergence of trade. Merchants sought to protect their professional secrets from competitors in order not to lose profits.

Risk assessment Confidential documents Internal threat

Risk assessment matrices


With the plethora of risks that accompany running a business, it is much more practical to have everything organized in written form or, better yet, in the form of diagrams for a concrete, concise representation of which risks the company faces as well as the severity of them.

Risk assessment Fraud Internal threat

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.

هل ترغب بالانتقال الى الصفحة الرئيسية,
او التعرف على المزيد عن الخدمات لمنطقة الشرق
الاوسط و شمال افريقيا؟
Do you want to visit main website
or learn more about MSS for MENA market?