Podcast 09 May 2023 EP04: The Modern Take on Social Engineering in Email In this episode, we delve into the world of social engineering, phishing, and spam campaigns,… Read More
Podcast 03 May 2023 EP03: The Reemergence of Emotet and Why Botnets Continue to Return Welcome back to the Security Swarm Podcast! In this episode, our host Andy Syrewicze talks… Read More
Security information 02 May 2023 Forgetting Curve according to Dr Ebbinghaus: Why cyber awareness training is an ongoing process People learn in different ways, at different speeds, and using different methods. Read More
Security information 30 April 2023 7 Reasons Why Security Awareness Is Critical for Employees There was a time when security awareness training was informal, short, and focused on simple… Read More
Podcast 26 April 2023 EP02: How Tech Pros Handle Security News Welcome back for another episode of the Security Swarm Podcast, the podcast that brings you… Read More
Security information 20 April 2023 Discover 9 Reasons Why You Should Choose VM Backup V9 as Your Backup Solution Discover 9 reasons why choosing VM Backup V9 as your backup solution for Microsoft Hyper-V… Read More
Podcast 18 April 2023 EP01: We Used ChatGPT to Create Ransomware In our very first episode we welcome to the show for an in depth discussion… Read More
Security information 22 March 2023 World Backup Day World Backup Day is an annual event on March 31st and dates back to 2011. Read More
Press Releases 16 March 2023 Security alert: Severe security vulnerability discovered in Microsoft Outlook — CVE-2023-23397 Discover the critical security vulnerability in Microsoft Outlook (CVE-2023-23397) that allows cybercriminals to exploit systems… Read More
EP16: Backup’s Modern Role in Security Podcast 01 August 2023 In today's episode, Andy has a special guest from our product development team at Hornetsecurity… Read more
Microsoft’s SFI Expansion, UK’s New PSTI Law & Updates on Change Healthcare Attack Podcast 09 May 2024 In this week's episode, Andy and guest Eric Siron discuss the cybersecurity landscape based on… Read more