Podcast 26/10/2023 EP25: Key Takeaways from our Ransomware Survey In today's digital landscape, ransomware threats have become an increasingly significant concern for organizations of… Read More
Security information 24/10/2023 Detecting and Preventing Password Spraying Attacks Passwords are common ways of logging into the system, service, or application. They are typically… Read More
Security information 20/10/2023 Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of… Read More
Podcast 18/10/2023 EP24: The Danger of Malicious OAuth Apps in M365 Malicious OAuth apps are an issue that has plagued M365 for many years. By default,… Read More
Security information 16/10/2023 Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced… Read More
What Your Employees Need to Know About Phishing + Real-Life Examples Email Security 18/04/2024 Read more
EP19: How to Sell Cybersecurity to the C-Suite Podcast 30/08/2023 As cybersecurity professionals, MSSPs, and security vendors, we often get mired down in the weeds… Read more
EP28: Differences Between DNS/Route-Based Email Security and Email Security via API Podcast 24/11/2023 Remember the days of DNS route-based email security? It's been a steadfast approach, but in… Read more