Soffid 3.4.7 is the latest version of our convergent platform. It is designed...
CATEGORIES
Customer
Protecting against Phishing: How Companies Can Stay Safe
Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming...
Protecting against Phishing: How Companies Can Stay Safe
Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming...
The use of the cloud as a primary tool puts companies’ data at risk
It is important to understand the latest tactics used by adversaries to compromise cloud infrastructure. Cloud exploitation is on the rise, and it is essential to be aware of the threats that...
How can helps an Identity and Access Management (IAM) strategy to keep company data safe.
Identity and Access Management (IAM) is a set of processes and technologies used to manage and protect an organization's data and resources. IAM is a fundamental component of information security...
Cyberattacks against the Retail Industry
Cyberattacks against the retail industry are an ongoing concern. There are a number of factors that make retail systems attractive targets for hackers. Fortunately, there are also effective...
Soffid 3.4.7 version 3.4.7 is now available.
Soffid 3.4.7 is the latest version of our convergent platform. It is designed to provide comprehensive protection against cyberattacks. This new release incorporates a convergent perspective, offering a 360º view of your organization's identities and optimizing the...
Protecting against Phishing: How Companies Can Stay Safe
Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming an increasingly common threat. In this post, we explain in more detail what it is and how hackers access companies' confidential information. We will also look at ways companies can protect...
Protecting against Phishing: How Companies Can Stay Safe
Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming an increasingly common threat. In this post, we explain in more detail what it is and how hackers access companies' confidential information. We will also look at ways companies can protect...
The use of the cloud as a primary tool puts companies’ data at risk
It is important to understand the latest tactics used by adversaries to compromise cloud infrastructure. Cloud exploitation is on the rise, and it is essential to be aware of the threats that businesses are facing. Why are adversaries accelerating cloud exploitation?...