Blogs.

Read our blogs for the latest cyber security updates.
free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

AI agents in cybersecurity

AI Agents in Cybersecurity: What’s Real, What’s Hype, and What's Next

Artificial intelligence is everywhere in cybersecurity conversations right now....

cyber threats report 2026

The Cyber Threat Landscape 2026: Building Resilience, Acting Fast

Cyber defence is entering a race measured in minutes, not days. As we move into...

free aitm browser extension

Microsoft 365 AitM Phishing Protection: Free Browser Extension

Adversary-in-the-Middle (AitM) phishing is a rapidly growing threat that can...

AI in cybersecurity, insights from the SOC

Insights from the SOC: Why Analysts Still Matter in the Age of AI

Every week, vendors announce new AI tools promising autonomous defence and...

fake captcha attacks - clickfix

ClickFix Block: Protect Your Organisation from Fake CAPTCHA Attacks

Curious about the technical details? Read our technical blog on ClickFix Block....

A new paradigm to extinguish cyber risk for good: 24/7 protection connects with cyber insurance

...

CrowdStrike Falcon and Microsoft blue screen issue updates

Last updated: July 30th at 00:00 CEST In this blog, we provided real-time...

NIS2 Directive Article 21 and Article 23

NIS2 Directive Overview: In-depth look at Articles 21 and 23

While many EU countries are still working out the specifics of implementing the...

NIS2: How the New EU Cyber Law Protects Your Business

Cyber attacks are now big business – but they’re impacting smaller companies....

NIS2 EU: Top 3 Cyber Laws and Their High-Level Definitions

Cybersecurity compliance can seem daunting. With so many new regulations coming...

1 2 3

Are you ready to get started?

See how affordable complete protection can be for you