Ahmed Elhaddad8 minSoftware Supply Chain Attacks: Understanding the Risks and Protecting Your Business (Vendor or User)In simple words, Software Supply Chain is a more conclusive term for a birds-eye view on the software development lifecycle. The stages...
Ahmed Elhaddad2 minEmpower your Microsoft 365 environment with Barracuda e-mail protection today!For IT organizations that need to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda...
Maysa Elawamry5 minSocial Engineering Pt.2 - How security awareness for individual members protects organizations. In our previous episode of the security awareness series, we talked to you about 7 manipulative tactics that cybercriminals use to...
Maysa Elawamry5 minSocial Engineering from Phishing to Vishing: How a user innocently assists a cyber attacker – Part 1Social Engineering is a description of tactics used by cyberattackers with malicious intents to harm a device or organization. Here's how.
Maysa Elawamry6 min10 types of Malware, their impact on your devices and network and how to stay protected. We explore 10 different malware types, how they infect your endpoints and how to stay proactively protected against them.
Mohamed Mowafy15 minThe 7 layers of cybersecurity- a comprehensive guide to ensure your protection up to the human layerBetween NIST, MITRE ATT&CK, and the likes. the 7-layer cybersec. map draws a comprehensive guide to cybersecurity that fits most use-cases.
Maysa Elawamry3 min5 reasons why MHE recommends Kaspersky Antivirus Software for resources-light businesses.Maysa reasons why Kaspersky's antivirus software makes sense for organizations with little to no spend on cybersecurity