Blog

Practical Cyber Security advice for owners of SME with minimal budget
Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC)
Frederik
06.10.23 03:07 PM - Comment(s)
Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.
Twilight Cyber offers ultra-fast detection of compromised machines and credentials, drastically minimizing the likelihood of ransomware attacks, data breaches, and internal system damages.
Frederik
25.09.23 07:47 AM - Comment(s)
Zafepass Prevent & Protect - NIST / Data science 8V’s / CIS 18 controls, MITRE ATT&CK / Kill-Chain
Zafepass Prevent & Protect - NIST / Data science 8V’s / CIS 18 controls, MITRE ATT&CK / Kill-Chain
Frederik
21.08.23 09:58 AM - Comment(s)
One Tool and Zero Trust
A Holistic Unified ‘Zero-Trust Platform’ • The Solution to Hundreds of Use-cases • Will Increase Operational Resilience & Agility • Turn Cyber-criminal Activity to Unsuccessful • Improve Employee Efficiency & Productivity
Frederik
20.08.23 12:34 PM - Comment(s)
What is Prevent & Protect? Gard-Railed and Micro Perimeter-based Security?
Prevent & Protect enable access to any resource in IT, OT and/or IoT environments, automatically enforcing security policies and processes leveraging guard-railed and micro-perimeter security principles in order to establish the strongest security posture available.
Frederik
06.07.23 12:10 PM - Comment(s)