With the increased use of cloud services and remote work, cybercriminals are increasingly targeting digital identity. Identity-based attacks are now…
Misconduct, inaccurate policies, and misconfigurations of endpoints are common vulnerabilities. The cyber kill chain usually looks for the weakest link…
We all use virtual private networks on an almost daily basis now. However, sometimes you might wonder if the VPN…
The ongoing Corona crisis means that many employees are working from home. A beneficial model, which many companies would like…
The threat of ransomware type attacks, the result of which is the hijacking of information, is increasingly present. It affects…