Sitemap
Posts
- What is GRC (Governance, Risk & Compliance) in Cyber Security? (22 July 2024)
- Strategies to Mitigate Cyber Security Incidents (14 June 2024)
- A Comprehensive Overview of Vulnerability and Patch Management for Corporations (1 May 2024)
- Exploring the Benefits of Privileged Access Management for Enterprises (1 May 2024)
- Protecting Against Zero-Day Threats with Advanced Endpoint Security Solutions (27 February 2024)
- The Role of Penetration Testing in Unveiling and Mitigating Cyber Vulnerabilities (27 February 2024)
- The Rising Importance of API Security in Protecting Your Digital Assets (28 November 2023)
- Demystifying SOAR: Streamlining Security Operations and Response in a Cyber-Threat Landscape (28 November 2023)
- Potential Barriers and Key Considerations in Implementing AI-Based Threat Response Systems (29 August 2023)
- NeuShield's One-Click Restore: Simplifying Data Recovery for Businesses (29 August 2023)
- Leveraging Machine Learning to Advance Threat Detection and Response (29 August 2023)
- Enhancing Cyber Resilience: NeuShield's Approach to Data Recovery (29 August 2023)
- Emerging Trends and Innovations in AI Threat Response (29 August 2023)
- Data Protection Innovations: An In-Depth Look at NeuShield’s Solutions (29 August 2023)
- Types of Penetration Testing (24 March 2022)
- Your Guide to Sandboxing: What It Is, Its Benefits, and How You Can Use It to Protect Your Virtual Environment (24 January 2022)
- What You Need to Know About Intrusion Detection Systems (21 January 2022)
- A Close Look at Endpoint Detection and Response (20 January 2022)
- SOAR: How It Works and How It Can Benefit Your Security Operations (4 January 2022)
- Tailgating: Examples, Risks and Defence Tips (4 January 2022)
- SIEM: How It Works and Selection Tips (4 January 2022)
- Understanding Identity and Access Management (29 November 2021)
- Cyber Security 101: Cyber Vulnerabilities and Attacks in the Digital Space (28 November 2021)
- Cyber Security Incident Response Plan (27 November 2021)
- What Is Phishing? Everything You Need to Know (29 October 2021)
- What is Data Security? Everything You Need to Know About Data Security (28 October 2021)
- The State of Cloud Security and Issues to Watch Out For (25 October 2021)
- Everything You Need to Know About Malware Protection (7 September 2021)
- Cybersecurity 101: Discovering the Ins and Outs of Ransomware and How to Avoid It (6 September 2021)
- Cybersecurity 101: All You Need to Know About Cybersquatting or Domain Squatting (2 September 2021)
- Why Good Database Security is Important (1 September 2021)
- Microsoft Power Apps Misconfiguration Exposes 38 Million Personal Records (23 August 2021)
- T-Mobile Confirms 48 Million Personal Records Breached in Cyberattack (16 August 2021)
- Can AR Glasses Replace Smartphones? (10 August 2021)
- Cybersecurity Teams Explained (7 August 2021)
- Italian COVID-19 Vaccine Booking Portal Knocked Offline in Ransomware Attack (2 August 2021)
- [Security Weekly] South African Trade and Logistics Halted Due to Ransomware Attack (30 July 2021)
- [Security Weekly] US Law Firm to Fortune 500 Companies Suffers Ransomware Attack and Data Breach (23 July 2021)
- [Security Weekly] Fashion Retailer Guess Hit By Ransomware, Personal and Financial Data Compromised (16 July 2021)
- [Security Weekly] Kaseya Exploited by REvil for Supply-Chain Ransomware Attack, 1,500 Firms Breached (9 July 2021)
- [Security Weekly] Microsoft’s Customer Support Tools Compromised by Nobelium (2 July 2021)
- [Security Weekly] Carnival Cruises Disclose a Fourth Data Breach Over a Period of 15 Months (25 June 2021)
- [Security Weekly] VW and Audi Expose 3.3 Million Personal Records Due to Vendor Mistake (19 June 2021)
- [Security Weekly] Gaming Giant EA’s Source Code and Debug Tools Stolen from Cyberattack (11 June 2021)
- [Security Weekly] World’s Largest Meat Distributor JBS Shuts Down Operations After REvil Ransomware Attack (4 June 2021)
Pages
- Sitemap (28 November 2023)
- Contact Us (6 June 2023)
- Webinars (6 June 2023)
- Privacy Policy (6 June 2023)
- Services (30 May 2023)
- Security Awareness Training (30 May 2023)
- Penetration Testing (30 May 2023)
- Integration Services (30 May 2023)
- Governance, Risk and Compliance (30 May 2023)
- About Us (25 April 2023)
- Solutions (24 April 2023)
- NeuShield (30 May 2023)
- ReaQta End Point Security (30 May 2023)
- Vulnerability and Patch Management (30 May 2023)
- Privileged Access Management (30 May 2023)
- API & WAAP Security (30 May 2023)
- SOAR (30 May 2023)
- Security Awareness Training (30 May 2023)
- Incident Response and Forensics (30 May 2023)
- SAP® to SIEM Security & Compliance (30 May 2023)
- Managed Security Services (30 May 2023)
- Identity and access management (30 May 2023)
- Data Security (30 May 2023)
- Platforms (24 April 2023)
- Datasheets (24 April 2023)
- Blog (23 April 2023)
- Front page (10 April 2023)