Don't miss the latest posts from our team.
What is ethical hacking and why does it play an important role in the strategy of CISOs and security technicians?
Can you ensure your IT security in and out of the office? Cybersecurity in teleworking should be your priority
Why has Microsoft become a worldwide security benchmark company? In this post we tell you all the reasons why!
Did you know that on October 1, 2022, Basic Auth will be permanently deactivated for all tenant clients that are still using it ?
We show you how to know if your device has been infected with the ZuoRat malware through an "Analytics Rules" query in Microsoft Sentinel.
What features should a SIEM system have? What differentiates a traditional SIEM from a Cloud SIEM? We tell you all about it
Learn all that Microsoft Defender for Office 365 can do - a holistic solution for preventing, protecting against and countering malicious attacks.
Information security is a company's most vital asset and a SOC service will shield, analyze and prepare your systems against cyber-attacks.
What is OSCP Certification and what does it mean in terms of IT security? How to obtain it and what should the applicant's profile be like? We tell you all about it!
In this article you will find out what a penetration analysis pentest is, what types there are, its phases and what differentiates it from a Red Team.
Web content filtering is part of the web protection features in Microsoft Defender for Endpoint. Here's how to do it.
AIP is the Microsoft service that will help you protect all corporate documentation by classifying, labeling and protecting all information.