Our Blog
Home / Blog
Cyber risks of working from home – Maintaining control over your IT environments
Working from home (WFH) has taken over as the new normal for employees at many organizations. Whether your outlook for extended WFH and social distancing is glass-half-full or half-empty, if you’re in IT, you’ve probably realized it drastically expands the estate...
The pitfalls of DIY application security
Despite the clear and growing risk of web-based attacks and data breaches, many still see web application security as a low-priority newcomer to the cybersecurity mix. This often leads to incomplete test coverage from a home-grown combination of point solutions. Let’s...
Beyond the Web Application Firewall (WAF): Common Myths about Web Application Security
For most organizations, web application security begins with solutions designed to address the Open Web Application Security Project (OWASP) Top Ten Web Application Security Risks[1]. These risks include the most common web application attack vectors, such as SQL...
Security awareness is not a waste of time
Many IT managers in companies rely on security awareness training to make employees pay attention to IT security. The measure has as many advocates as it has critics that oppose it. The latter can’t see the point of or has doubts about the effectiveness of such...
Microsoft 365 Price Increase and How to Prepare for Your Renewal Conversation
Last week, Microsoft announced its price increase for Microsoft 365, the first increase in a decade. In the announcement post, Microsoft’s corporate vice president justifies the price increase by outlining the feature improvements and application additions to...