Our Blog
Home / Blog

Apps built with Microsoft Power Apps may leak users’ personal information
How does the information companies collect fall into the wrong hands? Sometimes insiders sell it, and sometimes targeted hacking springs the leak, but most often, personally identifiable information gets out through misconfigured services or programs. Adding to...

Cyber risks of working from home – Maintaining control over your IT environments
Working from home (WFH) has taken over as the new normal for employees at many organizations. Whether your outlook for extended WFH and social distancing is glass-half-full or half-empty, if you’re in IT, you’ve probably realized it drastically expands the estate...

The pitfalls of DIY application security
Despite the clear and growing risk of web-based attacks and data breaches, many still see web application security as a low-priority newcomer to the cybersecurity mix. This often leads to incomplete test coverage from a home-grown combination of point solutions. Let’s...

Beyond the Web Application Firewall (WAF): Common Myths about Web Application Security
For most organizations, web application security begins with solutions designed to address the Open Web Application Security Project (OWASP) Top Ten Web Application Security Risks[1]. These risks include the most common web application attack vectors, such as SQL...

Security awareness is not a waste of time
Many IT managers in companies rely on security awareness training to make employees pay attention to IT security. The measure has as many advocates as it has critics that oppose it. The latter can’t see the point of or has doubts about the effectiveness of such...