BLOG

Actionable information, tips, and updates. Industry experts provide valuable insight and practical advice so that you can stay current on the latest cyber security issues

Whitepaper
BEC Checklist
Learn More
    • Middle East Image for cybersecurity trends
      Nick Loumakis, Regional Managing Director MENA Blog

      The Middle East’s Rise in Economic Growth: A Prime Target for Cybersecurity Threats

    • server room, obrela logo design
      Iraklis Mathiopoulos, Chief of Services Blog

      Why you need risk-aligned cyber security to build resilience

    • GRC image
      Blog

      What is GRC in Cyber Security? Why is it Important?

    • globe, earth, cloud, technology
      Blog

      What is Cloud Security? Best Practices, Challenges

    • coding code program programming developer compute
      Blog

      Vulnerability Assessment VS Penetration Testing: What’s the difference?

    • zero day vulnerability
      Blog

      What is a Zero Day Vulnerability? Meaning, Examples

    • Blog

      MDR vs MSSP: What is the difference?

    • close up programmer man hand typing keyboard input code for register and unlock system password on laptop
      Blog

      What is a WAF (Web Application Firewall)? How does it Work?

    • Cyber security network. Data protection concept. Businessman using laptop computer with digital padlock on internet technology
      Blog

      What is SIEM in cyber security? Definition & Meaning.

    • Close-up of a finger pressing a keyboard key with a digital warning symbol overlay
      Blog

      Top cyber security threats to look out for now

    • 1 of 6