Blogs.
Read our blogs for the latest cyber security updates.
Filter
#}
Search
Featured
4 min read
Microsoft 365 AitM Phishing Protection: Free Browser Extension
Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...
By:
Jorn Pieterse
5 min read
From Helper To Risk Factor: Why AI Canvases Deserve Executive Attention
Eye Research demonstrated that a shared AI canvas can convincingly imitate...
By:
Yasin Tas
9 min read
Business Email Compromise: Fifteen Steps to Reduce the Risk
Business email compromise (BEC) is a concept that first appeared around 2013...
By:
Yasin Tas
Bas van den Berg