Learning Hub.

This is where you learn about cybersecurity. We provide clear explanations, real-world examples, and best practices on essential cybersecurity topics such as endpoint protection, cloud security, and MDR.

Filter
Search
Close
endpoint protection

What is Endpoint Security?

Endpoint security refers to the practice of protecting devices such as laptops,...

attack surface management

Attack Surface Management (ASM): Proactively Securing Every Entry Point

ASM is a proactive approach to cybersecurity that helps organisations identify...

incident response service

What is an incident response service? IR service explained

When a cyberattack hits, every second counts. Whether it’s ransomware locking...

attack surface management explained

ASM Explained: Attack Surface Management for an Enhanced Defence

Attack Surface Management (ASM) helps organisations find and secure every...

advanced persistent threats (APT) article featured image

What Are Advanced Persistent Threats (APTs) and How to Protect Against Them?

APTs, or Advanced Persistent Threats, are highly sophisticated, long-term...

what is a SOC - the security operations centre explained

What is a SOC? The Security Operations Centre Explained

A security operations center (SOC) is where in-house or outsourced security...

ITDR expained

What Is ITDR? Identity Threat Detection and Response Explained

ITDR (Identity Threat Detection and Response) identifies and mitigates...

MDR providers

What Is MDR? Managed Detection and Response Explained

Looking to understand what is MDR? Managed Detection and Response (MDR) is a...

Sign up for our newsletter.

Illustration
MDR providers

6 MDR Providers to Watch in 2025

If considering Managed Detection and Response (MDR) to protect your...

protecting cloud identities with CDR

What Is Cloud Detection and Response (CDR)?

As companies use more and more cloud-hosted solutions for flexibility and...

social engineering and phishing

What is phishing as a form of social engineering?

Phishing, a form of social engineering, is a cyber attack that uses...

1 2

Ready to get started?