top of page


Nov 24, 2022
Microsoft updates its authentication options in Azure IDaaS
Microsoft's announcements for new authentication options within Azure AD aim to strengthen recent weaknesses in MFA.


Nov 21, 2022
Payment scams via e-mail are growing fast
The ransomware business model is successful. However, payment frauds relying on social engineering can sometimes be even more devastating.


Nov 17, 2022
Security breaches at government organizations follow familiar patterns
A report detailing a recent breach, points again to poor maintenance and misunderstandings on how to purchase and consume IT technology.


Nov 15, 2022
IT managed services set to grow
IT technology consumed as a service is becoming pervasive, with managed services sales anticipated to grow the most.


Nov 14, 2022
Phishing resistant MFA - the new normal
In most organizations, multifactor authentication (MFA) needs an upgrade: attackers have caught up and are now routinely bypassing it.


Nov 11, 2022
Long past incidents’ aftermaths are still being felt today
It's not only the cleanup bills, but also the legal fallouts from past breaches: the NotPetya attack still has an impact today, 5 years on.


Nov 9, 2022
Patch Tuesday for November 2022
This month's Microsoft bug fixes release does not offer much to prioritize and focus on.


Nov 8, 2022
The cyber regulation wave is coming
As cyber attacks increase, the governments across the globe feel a need to “do something". Companies will struggle to meet the requirements.


Nov 7, 2022
From Cybercrime to Cyber Resilience
As cybercriminals continue to act as sophisticated profit enterprises, basic security hygiene can prevent the vast majority of cyberattacks.
bottom of page