Is user training a good thing?

Is user training a good thing?

In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and self-proclaimed ones) emphasize that we should train our users constantly....
The three vectors of a pentest engagement.

The three vectors of a pentest engagement.

There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security controls implemented. Graybox The attacker has limited knowledge of the...
Twelve Cybersecurity Tips

Twelve Cybersecurity Tips

Due to the ongoing Covid-19 pandemic, teleworking has become the norm. Following our previous teleworking tips post, this one aims to help first-comers, both people and organisations to keep safe. It is usually those, who are the prime targets of black hat hackers. In...
In times of self-isolation

In times of self-isolation

When Sir Isaac Newton was in the university, the bubonic plague came around. Thus, he wasforced to stay in self-isolation in his dorm for a very big period of time. This was the time that hecame up with most of his big breakthroughs! When you are confined between four...