default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

+

Almost There!

Please fill out the form to complete your
brochure download

Category : Case Study

Twitter Hack

Twitter Hack: Social Engineering a Social Media Giant

Last Wednesday, July 15, 2020, several of the most influential accounts on Twitter, including Kim Kardashian, Bill Gates, Elon Musk and...

READ MORE
GoDaddy SSH Security Breach

GoDaddy Data Breach: Importance of SSH Security

GoDaddy, reputably, one of the world’s largest domain registrar with upwards of more than 19 million customers and approximately 77 million...

READ MORE
Team discussing a pressing issue

Third-party Risk: Magecart Creditcard Attacks

As Cloud Computing continues to grow, so do the breaches and disclosures of sensitive information. With the recent news surrounding credit...

READ MORE
Citrix Breach 2019

Citrix Breach: Terabytes of data compromised

On Friday, March 8, 2019 the software company Citrix issued a brief statement admitting that hackers had recently managed to breach...

READ MORE
Cyber Insurance Excludes Cyber War Coverage

Case Study: Cyber War Excluded from Cyber Insurance Coverage

Worldwide, businesses of all sizes have been purchasing cyber insurance policies to cover their assets as the risk of cyber-attack seems...

READ MORE
SingHealth Data Breach

SingHealth Data Breach: A Series of Unfortunate Cybersecurity Events

Lack of cybersecurity awareness, weak passwords, unpatched software, staff who fell prey to phishing attacks and an IT team that could...

READ MORE