Recent Posts

Categories

See all

Archives

See all

TNP Blog

Basics of Cyber Threat Intelligence (Part 2)

In this part, we will discuss types of threat intelligence and several use cases in real-world scenarios.

Types of Threat Intelligence

There are 3 types of threat intelligence:

Read more

How to Identify Indicators of Compromise (IoC)

Indicators of compromise play an important role in detecting cybersecurity threats and responding to security events in time. By learning how to identify these indicators, you can stop potential malicious activity from developing into a full attack

Read more

Steer clear from these types of malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works

Read more

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don't mean locked doors or watchful guards; we're referring to security against hackers that use printers as a weapon. Despite many companies going paperless,

Read more

New year, new cyber-threats

Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against

Read more

How Cyber Threats Derail Your Business

Cyber threats cost you money, precious time -- in the form of endless man-hours spent on protecting your company from Internet related threats, and can even derail your business completely. If you run a small or medium business, the losses can be
Read more

Recent Posts

Categories

See all

Archives

See all