A step to the left on the attack timeline – how to prevent instead of treat
The traditional Indicators of Compromise (IOC) model assumes the recognition and correlation of malicious ac...
Read more
Visibility and Vision
Once upon a time, data centers were a revolution. An air-conditioned environment full of servers, a team of ...
Read more
Data leakage – is it simple theft?
When data is sent outside a trusted network, it's not uncommon for us to assume that malicious intent is inv...
Read more
Spoofing
Spoofing - or impersonating a sender, domain or organization - is a serious problem in the digital world. In...
Read more
How to protect documents in a cloudy infrastructure
Back in 2018, a study by IBM's Institute for Business Value found that 85% of companies were using multiple ...
Read more