Blogs.

Read our blogs for the latest cyber security updates.

The Eyes Behind Eye Security: Why People Matter in Cyber Security

A message from Piet Kerkhofs, CTO & founder of Eye Security...

SNEAKY 2FA protecting against the threat

Sneaky 2FA: Use This KQL Query to Stay Ahead of the Emerging Threat

At Eye Security, we constantly seek out new threats and detection methods to...

cyber threats to manufacturing companies

Top 5 Cyber Threats Manufacturers Face in 2025

Cyber attacks can be devastating to manufacturers. They disrupt supply chains,...

Fake Microsoft 365 Login - Stop Credential Phishing Today!

Microsoft 365 Credential Theft? Here’s a Free Anti-Phishing to Bolster Your Defences

Credential phishing is a constant threat. And Microsoft 365? Prime target. It's...

cybersecurity for manufacturing - solving challenges

Manufacturing and Cybersecurity: What Are the Challenges? 

Manufacturing companies form the very foundation of the global economy....

EDR vs NDR

EDR vs NDR: Why Endpoint Security Has a Clear Advantage

Choosing the right cybersecurity tools can be challenging in a crowded...

Investigation of an 8Base Ransomware Attack Uncovers Surprising Insights

Almost every engagement of the Eye Security Incident Response team provides new...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration
business email compromise - decorative featured image

Business Email Compromise: Fifteen Steps to Reduce the Risk

Business email compromise (BEC) is a concept that first appeared around 2013...

A new paradigm to extinguish cyber risk for good: 24/7 protection connects with cyber insurance

...

Eliminating cyber risk for your clients together

Businesses built on partnership In the relatively short time we’ve been in...

Are you ready to get started?

See how affordable complete protection can be for you