Blog

Understanding and Effectively Using Threat Intelligence

By understanding the “who, what, why, and how” of cyber threats relevant to their specific environment, organisations can significantly improve their ability to prevent, detect, and respond to attacks, ultimately reducing risk and minimizing potential damage. Threat intelligence refers to the information an organisation collects, processes, and analyses to understand the capabilities, intentions, and attack […]

Blog

Ensuring the Trustworthy Handling of Data in the Sports Betting Industry

The Sports Lottery enhanced its information security protocols by migrating encryption keys to Utimaco SecurityServer Se-Series General Purpose HSM hardware security modules. Športna Loterija d.d. is a leading Slovenian provider of sports betting, contributing significantly to the financial sustainability of the Sports Foundation and the Foundation for the Financing of Disabled and Humanitarian Organisations. The main […]

Blog

Quantum Security: The AI Revolution

The rapid evolution of both quantum computing and artificial intelligence (AI) presents humanity with incredible opportunities, but also introduces significant challenges to our digital security landscape, particularly the public key encryption that underpins our modern world. For years, complex mathematical formulas have been the bedrock of cryptography. However, the convergence of AI and quantum computing […]

Blog

Why Zero Trust is Essential Security

With Zero Trust, users can access only the approved applications, systems, or specific resources they need, when they need them. Think about your network security. Is it like throwing an open house party, leaving your business exposed? What do your security measures and a house party have in common?   The Danger of ‘Trust at […]

Blog

AI’s Rapid Rise: Understanding LLM Vulnerabilities

See what the OWASP Foundation’s top 10 vulnerabilities are for large language models. The AI explosion, fueled by large language models (LLMs), has sparked both excitement and concern. To address potential risks, OWASP Foundation has outlined the top 10 vulnerabilities facing LLMs. Let’s break them down: Prompt Injection: Attackers can manipulate LLMs through carefully designed prompts. […]

Blog

Security Training: Your Best Defense

By providing employees with the training and knowledge to recognize phishing and social engineering attacks, businesses can strengthen their security posture, significantly reduce human error, and stay ahead of evolving threats. We can always count on people making mistakes. While most of our mistakes do not significantly affect our lives, some, even minor, everyday errors […]

Blog

Europe’s Blackout: The Need for Physical Network Control

Golden button: To better protect ourselves, we need to think beyond computer security. We need ways to physically control our network connections. On April 28th, 2025, something big and scary happened in Europe. The lights went out across Spain and Portugal. This blackout wasn’t just a small problem – it was huge, one of the […]

Blog

Cybersecurity Overkill: Less Can Be More

Beware: Believing that having sophisticated cybersecurity tools in place is enough leads to a precarious false sense of security. Even for SMBs. We often equate having more with being safer, a comforting thought that extends even to the complex world of cybersecurity. The idea that a larger arsenal of cybersecurity tools automatically translates to stronger […]

Blog

Addressing the Challenges of Inefficient Channel Management

Two out of three SMBs are likely or very likely to switch vendors or MSSPs after a negative experience. MSSPs simply can’t afford unhappy SMB owners because their cybersecurity platform or MDR isn’t manageable enough. Many Managed Service Providers (MSPs) find themselves grappling with increasingly inefficient methods of managing their diverse channel customers. The experience […]

Blog

Law Firms at Risk: Time to Strengthen Cybersecurity

Law firms are prime targets for cybercriminals — and many still aren’t taking the threat seriously enough. With access to vast amounts of sensitive client information, from personal details to financial data, law firms are a goldmine for hackers. The legal sector continues to top the charts for data breaches, with a staggering 86% of incidents involving […]