BLOG

Actionable information, tips, and updates. Industry experts provide valuable insight and practical advice so that you can stay current on the latest cyber security issues

Whitepaper
BEC Checklist
Learn More
    • globe, earth, cloud, technology
      Notis Iliopoulos, VP of MRC Blog

      Examining the NIS2 Directive: Strengths, Weaknesses, and a Possible Alternative Path for the UK

    • man with laptop security testing
      Notis Iliopoulos, VP of MRC Blog

      What is risk & risk management in cyber security? & Obrela’s Dynamic Approach

    • Iraklis Mathiopoulos, Chief of Services Blog

      Why Organisations Still Fall Victim to Phishing and How to Avoid It

    • Cyber security network. Data protection concept. Businessman using laptop computer with digital padlock on internet technology
      Blog

      ​What is a hash value and hash function in cyber security?

    • Blog

      What is an SQL injection and how to prevent it?

    • Blog

      What is a man in the middle attack? Definition & examples

    • technoloogy over the world
      Blog

      New cybersecurity threat-focused reports from ENISA

    • cybersecurity predictions
      Notis Iliopoulos, VP of MRC Blog

      The Future of Cybersecurity: Insights and Predictions for 2025

    • Compliance
      Notis Iliopoulos, VP of MRC Blog

      Get a unified approach towards Compliance with NIS2 and DORA

    • malware
      Blog

      What are the types of malware? Common types & examples

    • 1 of 8