Blogs.

How Microsoft might have lured unsuspecting end-users into the hands of criminals
...


A new paradigm to extinguish cyber risk for good: 24/7 protection connects with cyber insurance
...


CrowdStrike Falcon and Microsoft blue screen issue updates
Last updated: July 30th at 00:00 CEST In this blog, we provided real-time...


NIS2 Directive Overview: In-depth look at Articles 21 and 23
While many EU countries are still working out the specifics of implementing the...


NIS2: How the New EU Cyber Law Protects Your Business
Cyber attacks are now big business – but they’re impacting smaller companies....


NIS2 EU: Top 3 Cyber Laws and Their High-Level Definitions
Cybersecurity compliance can seem daunting. With so many new regulations coming...


How Microsoft might have lured unsuspecting end-users into the hands of criminals
...


Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...


How to defend against EvilProxy when a phishing attack strikes
Context Here at Eye Security, we have observed a disturbing increase in...


Mitigating Cyber Threats with Risk Intelligence
What is Risk Intelligence - and how can it help you? Business leaders...


Hunting for You and Eye #1
Eye Security's ongoing hunt for cyber threats provides valuable insights into...
