Your Guide to Cloud Security Audits: Tips, Challenges, and a Definitive Checklist

Awareness

Cyber basics

Endpoint security

Your Guide to Cloud Security Audits: Tips, Challenges, and a Definitive Checklist

Migrating to the cloud is a massive step for any business to take. As a company moves to and expands within the cloud, it becomes necessary to maintain awareness of its key

How to protect your company’s cloud security infrastructure

Awareness

Cyber basics

Endpoint security

How to protect your company’s cloud security infrastructure

With so many incredible benefits, cloud computing is revolutionizing business. From scalability and cost-effectiveness to storage capacity and the scope for innovation, cloud

A Beginner’s Guide to Cloud Security

Awareness

Cyber basics

Endpoint security

A Beginner’s Guide to Cloud Security

Cloud computing is changing the way we do business. It’s estimated that 60% of all corporate data is stored on the cloud ”“  twice as much as in 2015 ”“ while

Endpoints: How to Protect from Security Threats

Awareness

Endpoint security

Endpoints: How to Protect from Security Threats

Endpoints are the cybersecurity "front line" against malware attacks. Learn best practices to keep your business safe and find out more about our EDR

What AI-Driven EDR can do for you

Ackcent News

Endpoint security

What AI-Driven EDR can do for you

The security professional's job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run and outsmart most security

Basics- Linux Events Logging

Endpoint security

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main

KRACK or “How WPA2 did not die”

Awareness

Endpoint security

KRACK or “How WPA2 did not die”

Mathy Vanhoefm published a set of attacks against the Wi-Fi security protocol WPA2 with the name Key Reinstallation Attacks, or

Cloud forensic analysis, challenges and difficulties

Endpoint security

Cloud forensic analysis, challenges and difficulties

Cloud services irruption such as Amazon Web Services, Microsoft Azure and Google Cloud Platform among others makes possible to confirm that it is one of the most revolving