
Tick, tick, boom: The growing threat of email bombingÂ
Find out what email bombing is, how it can be used to attack your business, and how Microsoft Defender for Office 365’s latest update protects your business.
Find out what email bombing is, how it can be used to attack your business, and how Microsoft Defender for Office 365’s latest update protects your business.
ZTNA replaces the old “trust but verify” approach with “never trust, always verify.” In this article, we explain how ZTNA works, how it keeps remote access secure, and why it’s quickly replacing traditional VPNs.
SD-WAN is a smarter, more flexible way to connect your office locations and cloud services. This guide explains how SD-WAN works, how it improves performance and security, and why it’s a key part of the modern SASE model.
A Secure Web Gateway protects your users from dangerous websites, even when they're working remotely. In this article, we break down what an SWG does, how it works, and why it's becoming a key part of modern cyber security.
A CASB acts like a security checkpoint between your users and cloud apps like Microsoft 365 or Google Workspace. This guide explains how CASBs work, what risks they help manage, and whether your business might need one.
SASE and SSE are two of the biggest cyber security buzzwords right now, but what do they actually mean, and which one is right for your business? This plain-English guide breaks down the difference and helps you make sense of the jargon.
One weak password brought down KNP Logistics Group, leaving 700 jobless. Here are the lessons we can learn – and how to keep your business safe.
Discover how Huntress ITDR helps businesses detect Microsoft 365 breaches early, stop attackers in their tracks, and strengthen cloud identity security.
Cybernews researchers recently discovered what might be the biggest data breach in history. 16 billion passwords have been exposed, but what can we learn?
Still running Windows 10 or an older version? With key Microsoft operating systems reaching End of Life, unsupported devices pose real risks, from security breaches to compliance failures. Here's what you need to know.
A spate of cyberattacks in spring 2025 crippled M&S, Harrods, and the Co-op. Here we outline what happened, how ransomware played a part, and the lessons learned.
Device code phishing is a relatively new but no less dangerous cyberattack. Learn how it works and how to protect your business.