BLOG

Actionable information, tips, and updates. Industry experts provide valuable insight and practical advice so that you can stay current on the latest cyber security issues

Whitepaper
BEC Checklist
Learn More
    • Employees at desk
      Blog

      Why managed security services are now a business imperative

    • Blog

      How do EDR tools improve cyber security and threat response?

    • man with laptop security testing
      Notis Iliopoulos, VP of MRC Blog

      What is risk & risk management in cyber security? & Obrela’s Dynamic Approach

    • Close-up of a finger pressing a keyboard key with a digital warning symbol overlay
      Blog

      What is cyber incident response and why is it critical for cyber security resilience?

    • Iraklis Mathiopoulos, Chief of Services Blog

      Why Organisations Still Fall Victim to Phishing and How to Avoid It

    • Cyber security network. Data protection concept. Businessman using laptop computer with digital padlock on internet technology
      Blog

      ​What is a hash value and hash function in cyber security?

    • Blog

      What is an SQL injection and how to prevent it?

    • Middle East Image for cybersecurity trends
      Steve Marriott, MSS Middle East Director Blog

      The Middle East’s Rise in Economic Growth: A Prime Target for Cybersecurity Threats

    • Blog

      What is a man in the middle attack? Definition & examples

    • technoloogy over the world
      Blog

      New cybersecurity threat-focused reports from ENISA