Dec 20, 20212 min readCommon types of attacks: Cross-site scripting and SQL InjectionCross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks allow attackers to...
Dec 14, 20212 min readWhy does a proactive posture on cybersecurity attract more business to your company?Privacy is the key! Across the globe there is growing concern about the use and manipulation of an individual's personal data. Consumers...
Dec 13, 20211 min readWhat is an attack surface and why you should care!The combination of all the weak points found in a network environment that an attacker could use to penetrate or even extract information...
Dec 8, 20211 min readIs Cybersecurity an expense or an investment?Investing means owning an asset or an item with the goal of generating income from the investment or from the appreciation of your...
Dec 2, 20212 min readWhen should my company perform a pentest?A penetration test, is an authorized simulated cyber attack on a computer system, performed to assess the security of the system. The UK...
Dec 1, 20211 min readIs cyber insurance the solution?Cyber insurance is an insurance product designed to protect businesses and service providers against Internet-based risks