Category :

 Uncategorized

 4 Articles

Strategies for Effective Vulnerability Prioritization with EPSS and CVSS

October 8, 2024 - 7 mins read

Many businesses use the Common Vulnerability Scoring System (CVSS) to test the severity of vulnerabilities for prioritization. While these scores…

How to Get ISO 27001:2022 Compliant?

September 29, 2023 - 5 mins read

The ISO 27001:2022 standard for information security management systems (ISMS) is widely recognized. It is made to help businesses protect…

Ransomware Detection Through Threat Hunting

January 14, 2022 - 6 mins read

Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide.…

5 Biggest Cyber Attacks of 2020 (So Far)

October 30, 2020 - 6 mins read

The year 2020 has become remarkable in many ways, especially when it comes to the surge in cyber attacks. The…