Recent Posts

Categories

See all

Archives

See all

TNP Blog

Data Poisoning: When Artificial Intelligence and Machine Learning Turn Rouge (Part 2)

In the first part, we discussed why Artificial Intelligence and Machine Learning are at stake and tried to explain data poisoning in plain language. 

Read more

Data Poisoning: When Artificial Intelligence and Machine Learning Turn Rouge (Part 1)

Organizations are fearful of ransomware and to avoid that risks many business organizations rely on AI and ML as their defense mechanism. However, in a continuously evolving threat landscape, attackers always find a way to harm you. Data poisoning

Read more

How Scammers Target PayPal Users and How You Can Stay Safe

PayPal, a digital payment service that allows users to send and transfer money online, is one of the most popular payment gateways. 

Read more

The Advantages of Automation in Cybersecurity

It’s no secret that cybersecurity attacks have become heavily automated. While automation is one of the reasons security attacks are becoming unbearable, it can also be used on the more positive side to keeping data and devices protected. After all,

Read more

Growth of the Cyber Risk Insurance Industry

With the increased awareness of cybersecurity threats in 2019 came the growth of the cyber risk insurance industry. There has been a huge demand for cybersecurity tools and services on the market, leading businesses to focus on refining their

Read more

How to Lower the Risks of Privileged Users Compromise?

After a cybersecurity breach, the hacker’s first goal is to collect users’ credentials in order to laterally move through the network. They go after the credentials of privileged users in order to gain access to the most sensitive information.

Read more

How Does Phishing Bypass Email Filters?

Phishing is one of the most common cybersecurity threats nowadays. During a phishing attack, hackers send fake emails to their targets, pretending to be a reputable business or individual. In those emails, they include either infected attachments or

Read more

Effective Remote Working Strategies

The millennial generation at large is very fond of remote working and freelance-based work. Given that, in the modern digital environment the possibilities of remote working are far higher, and the fact that due to technology several new industries

Read more

5 Reasons Why Remote Workers Should Employ A VPN

Remote working is becoming the norm for workers from every level of the organization's hierarchy as many businesses are now taking up remote working as a permanent solution even after offices have started to reopen. Moreover, people who regularly

Read more

Security Awareness and Training Guide

Security training has always been one of the most important aspects of training an employee. After all, employees are every company’s weakest links and, if they are not aware of potential security threats online, they are far more likely to catch

Read more

Recent Posts

Categories

See all

Archives

See all