Blog
Cybersecurity: The Last Crusade
August 11, 2022
0 Comment
By Spiros Liolis
In a scene from Indiana Jones and the Last Crusade, Indiana Jones (Harrison Ford) and Dr. Henry Jones (Sean Connery) are on the beach, out of bullets, and a Nazi fighter plane is headed straight toward them. Dr. Jones has a revelation. He takes his umbrella and uses it to scare
4 Ways to Avoid the Next Colonial Pipeline Cyberattack
August 10, 2022
0 Comment
By Darren James
The devastating attack served as a cautionary tale of poor security hygiene, revealing how something as simple as reusing a single password or switching off multifactor authentication could result in such far-reaching consequences as the shutdown of a major U.S. gas pipeline—and impacting thousands of people. Lessons Learned From Colonial Pipeline Cyberattack
Everything you should know about zero-days and zero-day attacks in cybersecurity
August 10, 2022
0 Comment
By Karan Virdi
With fast-paced advancements in Internet communication technology, we have now well and truly entered the internet era. The internet has become an inseparable part of our lives, transforming the fortunes of billions worldwide. We know about how the internet has changed many aspects of our lives. There are some glaring
Easy Ways to Improve Your Cybersecurity
August 9, 2022
0 Comment
By Marc Berman
Did you know that every 39 seconds, there is a new cyber attack somewhere on the internet? Nowadays, cybersecurity is crucial. With millions of people around the world accessing the internet on a daily basis, companies and individuals are increasingly relying on information stored online. And as modern technology allows
The top identity-based attacks and how to stop them
August 9, 2022
0 Comment
By Gurinder Bhatti
The proliferation of Software as a Service (SaaS), the sudden explosion in a hybrid workforce, and the digital transformation revolution businesses have gone through all were aided by identity solutions that offer agility and modern capabilities. But as the reliance on identity has grown, so too have the attacks and