7 Social Media Phishing Scams to Watch Out For
Phishing attempts can come in the form of posts, direct messages (DMs) and advertisements, but how can you be sure?
Read MorePhishing attempts can come in the form of posts, direct messages (DMs) and advertisements, but how can you be sure?
Read MoreThe Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and will apply as
Read MoreThe cybersecurity landscape is undergoing a rapid and relentless transformation. Traditional, reactive approaches are no longer sufficient to counter the
Read MoreIn our interview with Purandar Das, CEO and Co-founder of Sotero, we delved into the pressing issue of ransomware threats
Read MoreWorld Backup Day has served as a reminder to play it safe with data for more than ten years –
Read MoreA Run Time Trend-based Comparison of NCS, ERSA, and EHS Abstract: Due to the recent explosion in the amount of
Read MoreIn October 2023 the Copenhagen based chain of real estate agents, EDC, was hit by a ransomware attack. The hackers behind the attack – the
Read MoreJoin us for an interview with Darren Thomson, Field Chief Technology Officer at Commvault, as we delve into the dynamic
Read MoreInsider threats are becoming just as big of a threat to cloud security as external threats. Whether accidental or on
Read MoreWhen it comes to internet safety, we all know the dangers of choosing ‘123456’ as a password or clicking links from unrecognised senders. But with online scams becoming increasingly sophisticated, internet
Read More