Blogs.

Read our blogs for the latest cyber security updates.
Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

NIS2 Directive Overview: In-depth look at Articles 21 and 23

While many EU countries are still working out the specifics of implementing the...

NIS2: How the New EU Cyber Law Protects Your Business

Cyber attacks are now big business – but they’re impacting smaller companies....

NIS2 and the EU's Top 3 Cyber Laws: High-level Definitions

Cybersecurity compliance can seem daunting. With so many new regulations coming...

Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

Cyber in logistics 2023: Hello new growth! Hello new risks...

Sustainability. Growth. Digitalisation. These are the words everyone’s using...

Bypassing MFA A Forensic Look At Evilginx2 Phishing Kit

How Eye Security can defend you against EvilProxies

Context Here at Eye Security, we have observed a disturbing increase in...

featured-image

Mitigating Cyber Threats with Risk Intelligence

What is Risk Intelligence - and how can it help you? Business leaders...

featured-image

Hunting for You and Eye #1

Eye Security's ongoing hunt for cyber threats provides valuable insights into...

featured-image

When it comes to cybersecurity, insurers set the bar high

The insurance market is now aware that cyber risk is difficult to manage and...

featured-image

Cyber insurance: your safety net in an increasingly risky world

To minimise the impact of a cyber incident, preventive security measures must...

1 2

Are you ready to get started?

See how affordable complete protection can be for you