Our Blog

Home / Blog

How Apple plans to monitor users

How Apple plans to monitor users

Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices. In early August 2021, Apple unveiled its new system for identifying photos containing images of child abuse. Although Apple’s motives —...

SaaS Benefits and Why You Need SaaS Management

SaaS Benefits and Why You Need SaaS Management

SaaS Benefits and Advantages Did you know the average company is using 80 software-as-a-service (SaaS) applications? In fact, the average company now pays for 20 times more SaaS subscriptions today than it did five years ago. One of the largest SaaS benefits is its...

Behind the jargon: False negatives in application security

Behind the jargon: False negatives in application security

Looking at research into web security testing, you will see a lot of talk about reducing false positives – but occasionally, you may also see the term “false negative”. Let’s cut through the jargon to see what false negatives are, what they mean for accuracy and...

11 Biggest cyber security threats in 2021

11 Biggest cyber security threats in 2021

Cyber security threats persist and continue to emerge during the last years. By now you probably heard about phishing, but did you know about polyglot files yet? This article covers a unique insight to the 11 biggest cyber security threats in 2021. 1. Phishing meets...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo