Blog
Want to stream KIJK outside of Holland? It is geo-restricted, so you’ll need a VPN. We explain how to watch KIJK on vacation, recommend the best VPNs for the job, and answer your questions.
By Ray Walsh in VPN & Privacy on November 22, 2023
Command and control attacks can be devastating to your organization. This post takes an in-depth look at command and control attacks and provides tips on how to defend against them.
By Marc Dahan in Information Security on September 25, 2023
As Iot devices grow in popularity, the number of threats that come with these devices is growing along with it. This post looks at the top 5 threats from IoT devices and what you can do to avoid them.
By Marc Dahan in Information Security on February 9, 2022
Want to stream Ziggo GO on vacation? Ziggo GO is geo-restricted, which means you’ll need a VPN. We explain how to watch Ziggo GO outside of Holland—and recommend the best Ziggo VPNs.
By Ray Walsh in VPN & Privacy on July 19, 2023
Want to stream Veronica outside of Holland? Veronica is geo-restricted, which means you’ll need a VPN. We explain how to watch Veronica abroad and recommend the best VPNs for Veronica.
By Ray Walsh in VPN & Privacy on February 8, 2022
Want to watch SBS6 outside Holland? Ziggo Go, KIJK, and KPN are all geo-locked, which means you’ll need a VPN. We explain how to stream SBS6 abroad and recommend the best VPNs.  
By Ray Walsh in VPN & Privacy on February 8, 2022
There are plenty of viruses that target devices, but macro viruses target applications - typically Word and Excel. In this post we look at how macro viruses work and what you can do to avoid them.
By Marc Dahan in Information Security on November 22, 2023
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
By Marc Dahan in Information Security on September 28, 2023
If your infrastructure is vulnerable to server-side request forgery attacks, the consequences could be devastating to your organization. We explain how SSRF attacks work and how you can avoid them.
By Marc Dahan in Information Security on November 13, 2023
Page 79 of 241