Cybersecurity and the BFSI: Thinking outside of the assessment check-box
Explore the role of cybersecurity in the BFSI sector and how you can accurately quantify cyber risks to determine the likelihood of a cyber breach.
How likely is your hospital to be hacked?
Learn how likely is your hospital to be hacked or cyber breached and why you can trust the SAFE score to assess your cyber risk posture.
Douglas W. Hubbard joins Safe Security’s Advisory Board
Douglas W Hubbard, founder of Hubbard Decision Research (HDR) and global leader in data science, is joining our advisory board. Learn more about him.
SAFE Valentine's Day
In this blog, you learn about some cyber security tips that you should follow to stay secure and avoid scams during Valentine's day. Read more here.
Reintroduction of Test-based Injection - Content Spoofing
In this blog, you will learn everything related to text-based injection which is commonly used for content spoofing or phishing attacks.
Introduction to Session Hijacking and Session Riding
In this blog, you will learn what is session hijacking and session riding in a practical manner. Understanding session hijacking is critical.
ssh-agent: Playing with the Trust | SSH Abusing
Here we will explore a vulnerability that can allow someone to access your server with root privileges if you are using public-key authentication.
Is India ready to face the next power blackout?
Here we will discuss whether India is ready to face the next power blackout because of cyber attacks? Read the facts here and decide for yourself.
How can a cyber defence measure play an important role in cyber insurance underwriting?
In this blog, you will learn how a cyber defense measure plays a vital role in cyber insurance underwriting. Read here for more information.
Importance of Software Updates and Security Patches
In this blog, you will learn why you should regularly update your software, apps, and operating systems to stay secure from cyber criminals.