Package for you. Please scan the QR code

Package for you. Please scan the QR code

How cybercriminals extract bank card details pretending to be DHL. Online shopping is now an established part of daily life: we get food, clothes and other goods delivered to our door in a couple of clicks. Online shopaholics, of which there are many, are may...
ZTNA is key to securing the hybrid workforce

ZTNA is key to securing the hybrid workforce

Zero Trust Network Access (ZTNA) provides remote users with an alternative to slow and clunky VPNs for accessing private business applications.  However, not all ZTNA solutions are created equal.  In addition to identity-based access control, Zero Trust requires...
Top 3 Reasons to Use Endpoint Data Loss Prevention

Top 3 Reasons to Use Endpoint Data Loss Prevention

The primary tool of today’s business environment is the computer. Whether a desktop or laptop, running on Windows or macOS, these are the devices employees spend most of their working hours in front of and on which they access sensitive information. They are...
$2 million inventory hacked in CS:GO

$2 million inventory hacked in CS:GO

An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items. What the hack?! On June 21, a Twitter user who goes by the name of ohnePixel report that $2,000,000+ worth of CS:GO...
5 Ways Large Enterprises Protect their Data

5 Ways Large Enterprises Protect their Data

Data protection has become an essential part of all business strategies, no matter the company’s size. In many countries, it has become a legal obligation. Data protection legislation such as the EU General Data Protection Regulation (GDPR) and the California Consumer...