What is Endpoint Detection & Response (EDR)?What is Endpoint Protection & Response (EDR)? How it works and why do companies need EDR?
IoT Security Risk in Healthcare IndustryIoT security is the new norm for Healthcare industry with vulnerability device scans increasing more than 400%. Healthcare providers need to
What is Credential Stuffing Attack?Attackers have been using Credential Stuffing Attack technique in the recent months in order to fraudulently gain access to user accounts. H
Evolving Boardrooms strategies in the era of disruptive cyber security riskCyber security risk is constantly evolving and now has become a boardroom topic. A quick snap at the 2018 Verizon Data Breach Report which h
How secure is your organization from uncovering the unknown?Securing your organization from sophisticated unknown attacks by implementing a robust multi tiered cyber security approach to unplug the la
Think ‘Consent’ is the only choice for GDPR compliance?GDPR was enforced this year to protect all EU citizens data and privacy from breaches.There is a misconception regarding consent as safe or