Data leakage – is it simple theft?

When data is sent outside a trusted network, it's not uncommon for us to assume that malicious intent is inv...
Read more


Spoofing - or impersonating a sender, domain or organization - is a serious problem in the digital world. In...
Read more

How to protect documents in a cloudy infrastructure

Back in 2018, a study by IBM's Institute for Business Value found that 85% of companies were using multiple ...
Read more

Cloud Threats in 2021

So far, we've devoted quite a bit of content to the ways in which digital transformation has impacted the wo...
Read more

Up to three times a piece! New trends in ransomware.

Unlike physical attacks, digital 'kidnapping for ransom' with ransomware are characterized by a 'more is mor...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info