Blog

December 7, 2021
Cloud Computing

Technical Security

Misconfigurations for Office 365

Most Common Misconfigurations for Microsoft Office 365
 read more
November 15, 2021
Step on gum

Technical Security

5 Most Common Attacks That Dodge Your Firewall.

A firewall is never enough. Here are the five most common ways you can be hacked that don't require going thru your firewall.
 read more
October 25, 2021
pentester or hacker?

Technical Security

4 Pentest Paradoxes You Must Get Right

Balance these 4 paradoxes to ensure you are happy with your next pentest
 read more
October 4, 2021
Taking Risks

Technical Security

Do a Risk Assessment before buying MDR

Why you need a Risk Assessment before you buy MDR Services
 read more
September 6, 2021
Crumbling Perimeter

Technical Security

Your Perimeter is Disappearing

You security perimeter is disappearing. Find out why and what to do about it
 read more
August 23, 2021
MDR, XDR, SOAR in a datacenter

Technical Security

XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response

XDR, MDR, SOAR and more! All the acronyms in cybersecurity explained right here.
 read more

join our email list