Back

CyberProof Blog

Hardening your operating system: A strategic approach to cyber defense

Cybersecurity
4 minute read

Mitigating cloud transformation risk with cloud-native solutions

Cybersecurity
5 minute read

Our newsletter is only one click away!

How quantum mechanics is transforming cybersecurity: A threat intelligence perspective

Cybersecurity
5 minute read

Securing the repository manager: Insights from a threat hunter

Cybersecurity
5 minute read

Cutting Costs with Microsoft Azure Data Explorer (ADX)

Cybersecurity
4 minute read

It’s time to be “Frank” about cybersecurity

Cybersecurity
1 minute read

Marketing in the cyber industry and the ethics of Surveillance Capitalism

Cybersecurity
4 minute read

The essential checklist for reducing the impact of ransomware attacks

Cybersecurity
3 minute read

How business-focused vulnerability management can improve cyber hygiene

Cybersecurity
2 minute read

BBC interview with President Yuval Wollman: The risks of GenAI

Cybersecurity
2 minute read

Using Handlebars to get the exact output structures you want from GPT4

Human Intelligence
8 minute read

How AI-powered tools and processes are transforming threat hunting

Cybersecurity
2 minute read

AI security risks: A CISO perspective

Cybersecurity
4 minute read

Reimagining security governance (part 3)

Cybersecurity
5 minute read

Reimagining security governance (part 1)

Cybersecurity
6 minute read

Advanced Persistent Threats (APTs) related to Chinese proxies

Cybersecurity
6 minute read

How APTs Maintain a Silent Grip on Enterprise Networks

Cybersecurity
4 minute read

Mitigating risk after large-scale security team layoffs

Cybersecurity
4 minute read

Advanced Persistent Threats (APTs) linked to Russian Proxies

Cybersecurity
5 minute read
BlackLotus

How the first UEFI bootkit, BlackLotus, bypassed Windows security

Cybersecurity
2 minute read

SOC Masterclass recap: AI, geopolitics, the recession and more

Cybersecurity
3 minute read

A Day in the Life of a SOC Manager: Interview with Aneesh Jayakumar

Cybersecurity
3 minute read

Threat hunter’s arsenal: The mindset and tools for proactive hunting

Cybersecurity
7 minute read

Women & Cyber - Debunking Misconceptions for International Women's Day

Cybersecurity
5 minute read

Interview: What can we do to boost gender diversity in cybersecurity?

Cybersecurity
2 minute read

5 Tips for Choosing a Managed EDR Solution

Cybersecurity
3 minute read

The Case for Managed Endpoint Detection & Response (EDR)

Cybersecurity
3 minute read

Targeted Threat Intelligence: Turning Challenges to Opportunities

Cybersecurity
4 minute read

8 New Year’s resolutions for cybersecurity professionals

Cybersecurity
4 minute read

Cybersecurity: new threats, new models - interview with Yuval Wollman

Cybersecurity
2 minute read

The real cost of stolen data

Cybersecurity
4 minute read

Why data protection is essential for your business

Cybersecurity
2 minute read

A look at some of the reasons behind top malware trends in 2022

Cybersecurity
6 minute read

How Retailers Can Ensure Consumer Data Protection This Holiday Season

Cybersecurity
5 minute read

Top Pains when Not Using the Right SOC as a Service

Cybersecurity
4 minute read

Leveraging Traditional HUMINT Methodologies in Cyberspace

Human Intelligence
4 minute read

6 New Year Promises for your Security Service Provider

Cybersecurity
2 minute read

Our newsletter is only one click away!

Topics