Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop Malta Blockchain Summit is a place where business representatives from Crypto Marketplaces, Online gaming, and gambling & Financial Technology companies meet up to network and receive up to date information....
IoT attack simulation

IoT attack simulation

IoT attack simulation Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security awareness on the part of...
Anomali and UnderDefense partnership

Anomali and UnderDefense partnership

Anomali and UnderDefense partnership Anomali is one of the most comprehensive Threat Intelligence Platforms. It boosts the reaction of analysts in Security Operations Center to unknown threats and investigate incidents faster. We are proud to have such a strong...
Mac based antimalware training

Mac based antimalware training

Mac antimalware training Apple customers believe that no adversaries can hack their personal data or access important files. We bust this myth about perfectly secure MacOS devices! During our Security Awareness training, we demonstrate how anyone can break this...
ISO 27001 assessment

ISO 27001 assessment

ISO 27001 assessment ISO 27001 is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber...

Pin It on Pinterest