top of page
Chana Karp
Dec 19, 20247 min read
Stop Scammers in Their Tracks: Strengthen Email Security with These Essential Protocols
Since the early 90s, people have been inundated with email phishing scams, most notably the infamous Nigerian prince who needs a small...
21 views0 comments
Chana Weisz
Dec 11, 20244 min read
Unveiling the Power of DAST (Dynamic Application Security Testing): Securing Applications in Real-Time
What is DAST? Dynamic Application Security Testing (DAST) is a technique designed to spot vulnerabilities and configuration issues in web...
20 views0 comments
Sara Wolpin
Nov 25, 20244 min read
Stay One Step Ahead - A Beginner’s Guide to WordPress Security
WordPress powers over 40% of the web, making it the go-to platform for millions of websites. However, its widespread popularity makes it...
24 views0 comments
Sara Wolpin
Nov 20, 20244 min read
Not Sure If Your Business Needs Cybersecurity? Here's what you should know.
Why does your business need cybersecurity.
33 views0 comments
Chana Karp
Nov 3, 20246 min read
ISO27001 - An Explanation and an Overview
I recently finished a cybersecurity bootcamp and started an internship at Tel-Arm, a company that provides security services. I figured...
45 views1 comment
Chana Weisz
Oct 29, 20245 min read
Cybersecurity in UK Schools
As schools become more reliant on IT and online systems, the importance of cybersecurity grows significantly. “An ounce of prevention is...
20 views0 comments
Sara Wolpin
Oct 13, 20242 min read
Cybersecurity Awareness Month Tips
Security Tip #1 Security Tip #2 Do you ever worry about your emails security? When you use an email address for multiple accounts there...
24 views0 comments
Sara Wolpin
Oct 10, 20243 min read
The American Water Cyberattack: A Case Study in Critical Infrastructure Vulnerability
The recent cyberattack on American Water serves as a stark reminder of the need to protect our critical infrastructure from emerging threats
16 views0 comments
bottom of page