Learn

A glossary and resources for cybersecurity threat detection & response, and security awareness.

What is Quishing?

Attackers are constantly devising new strategies to outpace security measures. One such emerging threat is ‘Quishing’, a sophisticated form of phishing that leverages QR codes to deceive users. This novel tactic underscores a critical aspect of cybersecurity: as digital technologies evolve and integrate more deeply into our daily lives, so too do the methods of exploitation employed by cybercriminals. QR codes, once celebrated for

Learn more »

Phishing

Phishing, a pervasive and sophisticated threat in the cyber landscape, extends far beyond the traditional confines of deceptive emails. This cyber attack mechanism has evolved into a multi-channel challenge, exploiting various communication platforms to target unsuspecting individuals. Whether it’s through social media messages, fraudulent websites, SMS, or even QR codes, attackers are continually refining their strategies to exploit human vulnerabilities. At the heart of

Learn more »

Remote Browser Isolation

Remote Browser Isolation (RBI) represents a technology-focused approach to safeguarding their organization’s digital assets. RBI is a technology conceived to mitigate web-based security threats by isolating internet traffic from direct contact with the user’s primary computing environment. This isolation is achieved through a process where web browsing activities, inclusive of essential security functions like filtering, sandboxing, and threat analysis, are executed on a remote

Learn more »

Multi-Factor Authentication

Multi-Factor Authentication (MFA), often known as Two-Factor Authentication (2FA) when it involves two steps, has become a buzzword in the cybersecurity realm. It’s an authentication mechanism that requires users to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong identity and access management (IAM)

Learn more »