A glossary and resources for cybersecurity threat detection & response, and security awareness.

What is Quishing?

Attackers are constantly devising new strategies to outpace security measures. One such emerging threat is ‘Quishing’, a sophisticated form of phishing that leverages QR codes to deceive users. This novel tactic underscores a critical aspect of cybersecurity: as digital technologies evolve and integrate more deeply into our daily lives, so too do the methods of exploitation employed by cybercriminals. QR codes, once celebrated for

Learn more »


Phishing, a pervasive and sophisticated threat in the cyber landscape, extends far beyond the traditional confines of deceptive emails. This cyber attack mechanism has evolved into a multi-channel challenge, exploiting various communication platforms to target unsuspecting individuals. Whether it’s through social media messages, fraudulent websites, SMS, or even QR codes, attackers are continually refining their strategies to exploit human vulnerabilities. At the heart of

Learn more »

Remote Browser Isolation

Remote Browser Isolation (RBI) is a cybersecurity technology that shields organizations from web-based threats by executing web browsing activities on a remote server. This isolation is achieved through a process where web browsing activities, inclusive of essential security functions like filtering, sandboxing, and threat analysis, are executed on a remote server. While RBI solutions provide robust protection, evaluating operational impacts, including resource utilization, user

Learn more »

Multi-Factor Authentication

Multi-Factor Authentication (MFA), often known as Two-Factor Authentication (2FA) when it involves two steps, has become a buzzword in the cybersecurity realm. It’s an authentication mechanism that requires users to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong identity and access management (IAM)

Learn more »