Archives for 2022

Active vs. Passive Monitoring: what’s the difference & why it matters

Regular network monitoring is essential for any organization. It ensures better business performance and provides optimal user experience. In this blog we explore active and passive monitoring, what’s the difference, and why it matters. …Continue Reading: Active vs. Passive Monitoring: what’s the difference & why it matters

3 ways the Digital Operational Resilience Act relates to email and domain security

To comply with DORA, businesses must make provisions in all areas of their business. But a key area that shouldn’t be overlooked is email and domain security, or rather how businesses look to mitigate threats relating to this…Continue Reading: 3 ways the Digital Operational Resilience Act relates to email and domain security

What is a beg bounty? How to avoid paying out for DMARC vulnerability 

In an ideal world, you’d be able to spot and secure every vulnerability in your attack surface. But in the ever-evolving age of online, this just isn’t feasible. This is why we have responsible disclosure and bug bounty programs. But how does DMARC vulnerability fit in?…Continue Reading: What is a beg bounty? How to avoid paying out for DMARC vulnerability