Blog

Can you steal what can't be detected?
"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete" R. Buckminister Fuller
Frederik
30.11.23 01:07 PM - Comment(s)
Paradigm-shift-in-Cyber-Security-approach?
The Zafepass Prevent & Protect platform are by design leveraging Guard-Railed, Micro- Perimeter, and De-perimeterization based methodologies for ‘access and security’
Frederik
07.11.23 11:33 AM - Comment(s)
Practical Cyber Security advice for owners of SME with minimal budget
Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC)
Frederik
06.10.23 03:07 PM - Comment(s)
Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.
Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.
Frederik
25.09.23 07:47 AM - Comment(s)
Zafepass Prevent & Protect - NIST / Data science 8V’s / CIS 18 controls, MITRE ATT&CK / Kill-Chain
Zafepass Prevent & Protect - NIST / Data science 8V’s / CIS 18 controls, MITRE ATT&CK / Kill-Chain
Frederik
21.08.23 09:58 AM - Comment(s)