A blog about the importance of training and certifications when working towards NIS2 compliance.
A blog about the importance of training and certifications when working towards NIS2 compliance.
Learn about ITSM certifications and which ones are most important for various roles within the technology sector.
Authenticator apps provide an extra layer of security. Learn about the best authenticator apps to secure your online accounts and protect your privacy.
Microsoft has called on UK business leaders to “fight fire with fire” by adopting AI cybersecurity tools to defend themselves from cyberattacks.
We’ve been offering our Security Onion documentation in book form on Amazon for a few years and it’s now been […]
The GoFetch vulnerability, which affects Apple’s M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.
Understanding the tricky way that subdomain attacks use your email authentication against you.
In January 2019, the now defunct MMO and RPG game SwordFantasy suffered a data breach that exposed 2.7M unique email addresses. Other impacted data included username, IP address and salted MD5 password hashes.