Latest Content

View all
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security

The Seven Essentials of a Modern Email Security Platform

Did you know that any organisation, regardless of size and the number of in-house security personnel employed, can now automatically prevent, detect and respond to all types of sophisticated phishi...

Read article
Identity and Access Management

The New Workplace: Re-imagining work after 2020.

The COVID-19 pandemic has forced millions of people around the globe to stay in their homes. As a result, more employees than ever are working remotely. To some, this new way of working comes as a ...

Read article
Products
Security

FAKE LOGIN PAGES AND PHISHING EMAIL EXAMPLES

Phishing websites, also known as spoofed websites, are a common deception tactic that cyber attackers use to obtain a person’s login credentials to a legitimate website. The operation, commonly kno...

Read article
Security

Enhancing Cybersecurity Posture For A Private Equity Firm: A Case Study

Discover how a mid-sized private equity firm transformed its cybersecurity posture, saving £300k annually and mitigating major risks in a single brand within its portfolio. The Need for Cybersecuri...

Read article
Community

The Cyber Threat to Sports Organisations

Sport is central to British life. It provides massive health, social and economic benefits to the nation, contributing to over £37 billion to the UK economy each year. Unfortunately, this financial...

Read article
Community
Security

MICROSOFT 365 ATP IS NOT BUILT TO DEFEND AGAINST MODERN REAL-WORLD EMAIL THREATS

It’s hard to overestimate how fundamental email has become as a route to attack enterprises. While there are numerous ways for attackers to target organisations, email is almost-always the common d...

Read article