Apr 04, 2022
What Is SaaS (Software as a Service)?
SaaS stands for “Software as a Service” and is a cloud-based IT service.
Apr 04, 2022
Erin Stephan
SaaS stands for “Software as a Service” and is a cloud-based IT service.
Mar 31, 2022
Rotem Shemesh
Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
Mar 14, 2022
Erin Stephan
Microsoft only assures service availability to Teams’ 270 million monthly active users, and not the data within, making it necessary for businesses to implement an integrated solution that provides Microsoft Teams users with data backup plus advanced threat protection.
Mar 03, 2022
Ofir Yaakobi
With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.
Feb 24, 2022
Tulsie Narine
What is Sender Policy Framework (SPF) and how exactly does the protocol work?
Feb 22, 2022
Elizabeth Fichtner
Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security.
Feb 21, 2022
Elizabeth Fichtner
Deep Learning (DL), an AI methodology, is propelling the high-tech industry to the future with a seemingly endless list of applications.
Feb 18, 2022
Elizabeth Fichtner
A compromise assessment is focused on looking at the current state of the health of your ecosystem and is a critical point in defining the treatment of found threats.
Feb 15, 2022
Elizabeth Fichtner
Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?
Feb 14, 2022
Elizabeth Fichtner
Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.
Feb 08, 2022
Elizabeth Fichtner
Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.
Jan 27, 2022
Rotem Shemesh
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.