Mikthan Security Technologies Limited have curated a collection of “essential” articles on key IT security topics. These articles have been packaged into guides which offer our readers comprehensive, problem solving content to help inform and guide their research.
A lot of best practices teach users how to prevent or defend against phishing attacks, but how can organizations actively detect and thwart them before users even see them?
A Man-in-the-Middle (MitM) attack is a type of attack that involves a malicious element “listening in” on communications between parties, and is a significant threat to organizations.
This Bring Your Own Device Guide will tackle the primary threats organizations face when implementing BYOD programs, as well as best practices and solutions to mitigate these threats.
Email remains an important communication tool for business organizations. Unfortunately, its widespread use also makes it an ideal platform for cybercrime. Here are some tips for dealing with email-based threats.
Web injections are every programmer, developer and information security (InfoSec) professional’s headache—and a permanent fixture in a cybercriminal’s toolkit. Here are some countermeasures that can be employed to mitigate, if not thwart, these attacks.