Our latest blog posts

Security Information and Event Management (SIEM): Q/A with LogRhythm
Security Information and Event Management (SIEM): Q/A with LogRhythm
Cyber-attacks are on the rise and so is the resulting damage, and no one is 100% safe from, as attackers are constantly improving their schemes and tools. All kinds of organizations are implementing several different cybersecur...
Phishing Attacks: A Survival Guide by Cofense
Phishing Attacks: A Survival Guide by Cofense
Hackers are continuously coming up with new forms of malicious emails and schemes, so even using antivirus software with phishing protection is not enough to save you from losing sensitive information, like bank accounts credentia...
Protect Your Online Identity With These Expert Tips By Idenhaus Consulting
Protect Your Online Identity With These Expert Tips By Idenhaus Consulting
It’s beyond doubt that digital transformation has been a savior for many businesses in terms of cost-savings and improved efficiency, but going fully online comes also at a risk In fact, organizations embracing digital transfor...
How To Build Secure Mobile Applications: Expert Tips by Security Compass
How To Build Secure Mobile Applications: Expert Tips by Security Compass
In the era of mobile communication, application security is a priority that developers simply can’t ignore, if they want to avoid losing money (a LOT of money) and trust from their customers. Therefore, every software company m...
Artificial Intelligence and Cybersecurity: Q/A With Juniper Networks
Artificial Intelligence and Cybersecurity: Q/A With Juniper Networks
In this interview we are going to talk with Drew Simonis, Chief Information Security Officer at Juniper, a multi-awarded company developing industry-leading software powered by artificial intelligence that helps Fortune 500 firms,...
Are Online Payments Safe? Q/A on Digital Payments Security With Helcim
Are Online Payments Safe? Q/A on Digital Payments Security With Helcim
eCommerce is growing by the day and so are the investments in cybersecurity for online payments, so can we safely assume that digital payments are safe nowadays? After all, hacked accounts, data breaches, and card fraud, are st...
Interview With Jamie Miller - Mission Multiplier
Interview With Jamie Miller - Mission Multiplier
Safety Detective hears from Jamie Miller, President and CEO of Mission Multiplier on how his company makes a direct impact to the community with the mission of "for profit - for purpose". Please share your company background, how...
Private Registries and Cybersecurity - Expert Insights by Mirantis
Private Registries and Cybersecurity - Expert Insights by Mirantis
The demand for software applications is increasing exponentially, so is the need to secure the software supply chain, and one sure way to make a software development process more secure is to switch from a public registry to a pri...
Interview with Claus-Peter Beringer - eclipso Mail & Cloud
Interview with Claus-Peter Beringer - eclipso Mail & Cloud
Claus-Peter Beringer tells Safety Detective talks about how he set up an e-mail service provider based on his own ideas and concepts, and how their services are unique. Please tell us about what eclipso Mail & Cloud does and...
Interview with Yaroslav Savenkov - ZoogVPN
Interview with Yaroslav Savenkov - ZoogVPN
Using a VPN can help unblock services in heavily-censored countries while also securing your network. We spoke to Yaroslav Savenkov, CEO of ZoogVPN to find out more about the company and what security measures companies should put...