28 August

Verizon’s Latest Survey Highlights Rising Risks from Mobile and IoT Devices in Corporate Environments In a recently published survey conducted by Ve...

Read More
27 August

Imagine this scenario: You receive a seemingly innocent text message on your phone telling you to click on a link to claim a special offer. Without su...

Read More
15 August

Did you know that 75% of people are already using Generative AI (GenAI) at work? GenAI tools are defined as any artificial intelligence that can gener...

Read More
05 June

The phishing landscape has evolved significantly in recent years, encompassing various types of attacks. Many companies have developed taxonomies to c...

Read More
02 June

One of the scariest acronyms in a CISO’s knowledge base is APT – Advanced Persistent Threat. This term refers to someone determined to harm yo...

Read More
14 May

We often find ourselves entrenched in yesterday’s battles, grappling with legacy systems, applying products launched last year, responding to at...

Read More
09 May

In the landscape of cybersecurity threats, one adversary business module and implementation theme stand out as particularly concerning for security pr...

Read More
30 November

Guest Blog Written by Ira Winkler Considered one of the world’s most influential security professionals, Ira Winkler, President of Secure Mentem &am...

Read More
12 November

Guest Blog Written by Ira Winkler Considered one of the world’s most influential security professionals, Ira Winkler, President of Secure Mentem...

Read More
4a34e52d-562b-4e1e-8b71-5c005a7559a9