BLOG

Actionable information, tips, and updates. Industry experts provide valuable insight and practical advice so that you can stay current on the latest cyber security issues

Whitepaper
BEC Checklist
Learn More
    • man with laptop security testing
      Notis Iliopoulos, VP of MRC Blog

      What is risk & risk management in cyber security? & Obrela’s Dynamic Approach

    • Close-up of a finger pressing a keyboard key with a digital warning symbol overlay
      Blog

      What is cyber incident response and why is it critical for cyber security resilience?

    • Iraklis Mathiopoulos, Chief of Services Blog

      Why Organisations Still Fall Victim to Phishing and How to Avoid It

    • Cyber security network. Data protection concept. Businessman using laptop computer with digital padlock on internet technology
      Blog

      ​What is a hash value and hash function in cyber security?

    • Blog

      What is an SQL injection and how to prevent it?

    • Middle East Image for cybersecurity trends
      Steve Marriott, MSS Middle East Director Blog

      The Middle East’s Rise in Economic Growth: A Prime Target for Cybersecurity Threats

    • Blog

      What is a man in the middle attack? Definition & examples

    • technoloogy over the world
      Blog

      New cybersecurity threat-focused reports from ENISA

    • cybersecurity predictions
      Notis Iliopoulos, VP of MRC Blog

      The Future of Cybersecurity: Insights and Predictions for 2025

    • Compliance
      Notis Iliopoulos, VP of MRC Blog

      Get a unified approach towards Compliance with NIS2 and DORA