Stay up to date with our tips and articles on IT security and take a look behind the scenes of cybercrime and artificial intelligence.
Knowledge Base
Personal responsibility and cybersecurity: Refl...
At the end of September 2023, the Motel-One hotel chain was the target of a serious hacker attack in which, according to public information, more than 6 terabytes of customer...
Personal responsibility and cybersecurity: Refl...
At the end of September 2023, the Motel-One hotel chain was the target of a serious hacker attack in which, according to public information, more than 6 terabytes of customer...
What is Pentesting?
"Pentesting" stands for "penetration testing" and describes the process in which computer systems, networks or applications are checked for security gaps. This involves trying to act like an attacker to...
What is Pentesting?
"Pentesting" stands for "penetration testing" and describes the process in which computer systems, networks or applications are checked for security gaps. This involves trying to act like an attacker to...
Redteaming - strengthening cybersecurity for co...
In the cybersecurity arena, “redteaming” is not just another buzzword. It's an advanced method that organizations use to really test their defenses. While penetration testing reveals vulnerabilities in systems, redteaming...
Redteaming - strengthening cybersecurity for co...
In the cybersecurity arena, “redteaming” is not just another buzzword. It's an advanced method that organizations use to really test their defenses. While penetration testing reveals vulnerabilities in systems, redteaming...
APT - Complex attacks on companies
An Advanced Persistent Threat (APT) is a complex form of cyber attack in which an attacker seeks persistent access to a network or system and attempts to remain undetected. These...
APT - Complex attacks on companies
An Advanced Persistent Threat (APT) is a complex form of cyber attack in which an attacker seeks persistent access to a network or system and attempts to remain undetected. These...
What is Endpoint Security?
What is Endpoint Security? Endpoint Security is a security solution that protects endpoint devices such as laptops, desktops, smartphones and tablets from malware, data theft and other threats. Endpoint security...
What is Endpoint Security?
What is Endpoint Security? Endpoint Security is a security solution that protects endpoint devices such as laptops, desktops, smartphones and tablets from malware, data theft and other threats. Endpoint security...
Received a phishing email - what to do?
We've put together a simple step-by-step guide on what to do if you've received a phishing email Don't panic: it's important to stay calm. Simply receiving a phishing email is...
Received a phishing email - what to do?
We've put together a simple step-by-step guide on what to do if you've received a phishing email Don't panic: it's important to stay calm. Simply receiving a phishing email is...
Stay up to date
Get the latest cybersecurity news, event invitations and threat alerts.