Blogs.

Read our blogs for the latest cyber security updates.
Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

ransomware recovery case

8Base Ransomware Recovery: Key and File Retrieval

The Eye Security Incident Response team was recently engaged to investigate a...

EDR vs NDR

EDR vs NDR: Why Endpoint Security Has a Clear Advantage

Choosing the right cybersecurity tools can be challenging in a crowded...

8Base Ransomware Investigation Uncovers Surprising Insights

Almost every engagement of the Eye Security Incident Response team provides new...

business email compromise - decorative featured image

Business Email Compromise: Fifteen Steps to Reduce the Risk

Business email compromise (BEC) is a concept that first appeared around 2013...

A new paradigm to extinguish cyber risk for good: 24/7 protection connects with cyber insurance

...

Eliminating cyber risk for your clients together

Businesses built on partnership In the relatively short time we’ve been in...

Product Update: Demo Portal

In this blog, we sit down with Anne Postma, our Product Manager, to discuss the...

Get in touch.

Speak to one of our experts and see how we can help
Let's talk
Illustration

Product Update: Vulnerability & Threat Hunting

In this blog, we interview Robbin Begeer, Product Manager at Eye Security,...

CrowdStrike Falcon and Microsoft blue screen issue updates

Last updated: July 30th at 00:00 CEST In this blog, we provided real-time...

NIS2 Directive Overview: In-depth look at Articles 21 and 23

While many EU countries are still working out the specifics of implementing the...

1 2 3 4 5

Are you ready to get started?

See how affordable complete protection can be for you