Inside the Ink

April 01, 2025

Stopping BEC Starts with User Protection

Learn how investing in user protection helps you protect your organization from costly BEC scams before they start.

Read More
March 26, 2025

Business Continuity in the Face of Ransomware

Learn how Spanning Backup and Datto SaaS Protection — critical components of Kaseya 365 User —protect your SaaS data against ransomware.

Read More

The Week in Breach News: 03/19/25 – 03/25/25 

A Zero-Day exposes bank data, hackers steal zoo research data, big trouble for a New Zealand retailer & building cyber resilience

Read More
March 24, 2025

5 Proven Ways to Strengthen Cyber Resilience by Safeguarding Users

Today’s sophisticated cyberthreats require a smarter defense. These 5 actionable tips can help you strengthen a company’s cyber resilience.

Read More
March 19, 2025

The Week in Breach News: 03/12/25 – 03/18/25

A hit with the first AI-created ransomware strain, an attack leaves a Canadian chocolatier with a bitter taste & guarding your human firewall

Read More
March 18, 2025

The Human Firewall: Strengthening Your Organization’s Most Vulnerable Gateway 

Discover the benefits of choosing a three-pronged comprehensive user risk management approach that addresses the problem holistically.

Read More
March 12, 2025

The Week in Breach News: 03/05/25 – 03/11/25

Japanese telco attack hits 1.8M customers, five urgent user threats and optimizing your user protection strategy.

Read More
March 11, 2025

4 Essential Questions for Optimizing Your User Protection Strategy

Discover how a comprehensive user protection strategy can mitigate the financial, reputational & regulatory fallout of cybersecurity risks.

Read More
March 06, 2025

Credential Phishing: A Growing Threat to SaaS Security

Credential phishing remains a major threat to businesses today. Discover how Graphus and DarkWeb ID help you tackle phishing attacks confidently.

Read More
March 05, 2025

The Week in Breach News: 02/26/25 – 03/04/25

3.3M job seekers’ data exposed; hackers halt Cleveland courts; 10 AI cybercrime tactics; securing your organization’s weakest gateway.

Read More

Please fill in the form below to subscribe to our blog