Back

CyberProof Blog

3 ways companies can protect against critical infrastructure attacks

Cybercrime
1 minute read

Protect your code in compliance with GDPR

Cybersecurity
3 minute read

Our newsletter is only one click away!

SIEM Migration: Why now?

Cloud Migration
3 minute read

How to avoid romance fraud this Valentine's

Cybercrime
2 minute read

Hardening your operating system: A strategic approach to cyber defense

Cybersecurity
4 minute read

Mitigating cloud transformation risk with cloud-native solutions

Cybersecurity
5 minute read

How quantum mechanics is transforming cybersecurity: A threat intelligence perspective

Cybersecurity
5 minute read

Securing the repository manager: Insights from a threat hunter

Cybersecurity
5 minute read

Cutting Costs with Microsoft Azure Data Explorer (ADX)

Cybersecurity
4 minute read

An Analysis of the Security Risks Posed by Tor Browser

Security Monitoring
5 minute read

It’s time to be “Frank” about cybersecurity

Cybersecurity
1 minute read

Creating a smarter SOC with the MITRE ATT&CK framework

Use Case Factory
3 minute read

Marketing in the cyber industry and the ethics of Surveillance Capitalism

Cybersecurity
4 minute read

The path to becoming a SOC Analyst: Interview with Anusthika Shankar

Cybersecurity jobs
4 minute read

The essential checklist for reducing the impact of ransomware attacks

Cybersecurity
3 minute read

How business-focused vulnerability management can improve cyber hygiene

Cybersecurity
2 minute read

BBC interview with President Yuval Wollman: The risks of GenAI

Cybersecurity
2 minute read

Using Handlebars to get the exact output structures you want from GPT4

Human Intelligence
8 minute read

Forrester report: GenAI's impact on security operations

Security Operations
2 minute read

How AI-powered tools and processes are transforming threat hunting

Cybersecurity
2 minute read

AI security risks: A CISO perspective

Cybersecurity
4 minute read

Reimagining security governance (part 3)

Cybersecurity
5 minute read

Securing user IDs & passwords: Insights from a threat hunter

Cybersecurity Threats
3 minute read

Reimagining security governance (part 2)

Security Operations
8 minute read

Reimagining security governance (part 1)

Cybersecurity
6 minute read

Advanced Persistent Threats (APTs) related to Chinese proxies

Cybersecurity
6 minute read

How APTs Maintain a Silent Grip on Enterprise Networks

Cybersecurity
4 minute read

How AI is shifting the paradigm to give more power to threat actors

3 minute read

Mitigating risk after large-scale security team layoffs

Cybersecurity
4 minute read

Advanced Persistent Threats (APTs) linked to Russian Proxies

Cybersecurity
5 minute read
BlackLotus

How the first UEFI bootkit, BlackLotus, bypassed Windows security

Cybersecurity
2 minute read

SOC Masterclass recap: AI, geopolitics, the recession and more

Cybersecurity
3 minute read

A Day in the Life of a SOC Manager: Interview with Aneesh Jayakumar

Cybersecurity
3 minute read

Threat hunter’s arsenal: The mindset and tools for proactive hunting

Cybersecurity
7 minute read

Women & Cyber - Debunking Misconceptions for International Women's Day

Cybersecurity
5 minute read

Interview: What can we do to boost gender diversity in cybersecurity?

Cybersecurity
2 minute read

5 Tips for Choosing a Managed EDR Solution

Cybersecurity
3 minute read

The Case for Managed Endpoint Detection & Response (EDR)

Cybersecurity
3 minute read

Targeted Threat Intelligence: Turning Challenges to Opportunities

Cybersecurity
4 minute read

How ransomware actors use EDR bypassing to run cybercrime campaigns

Cybercriminal
3 minute read

8 New Year’s resolutions for cybersecurity professionals

Cybersecurity
4 minute read

Cybersecurity: new threats, new models - interview with Yuval Wollman

Cybersecurity
2 minute read

The real cost of stolen data

Cybersecurity
4 minute read

5 takeaways from Forrester’s latest privacy report

Forrester Report
2 minute read

5 Cyber Health Strategies We Can All Be Thankful For

2 minute read

Are attackers using AiTM to bypass your MFA and obtain account access?

Cyberattack
3 minute read

Why data protection is essential for your business

Cybersecurity
2 minute read

CyberProof SOC Masterclass: Managing cloud-native security operations

Security Operations Center
5 minute read

IOC Data Suggests Russia Bypassed Geolocation Bans – CTI Report

Threat Intelligence
2 minute read

Double-bounced attacks with email spoofing – 2022 trends

Cyberattack
3 minute read

Our newsletter is only one click away!

Topics