The Story Behind Potech’s PartnershipsWe’ve been regularly announcing new partners, including VADs (Value-Added Distributors) and VARs (Value-Added Resellers). Beyond the…Nov 5Nov 5
Le Double Rôle de l’Intelligence Artificielle en CybersécuritéL’intelligence artificielle (IA) s’impose désormais comme nécessité en matière de cybersécurité, offrant des outils puissants pour…Sep 23Sep 23
Combating SOC Fatigue: How Potech Preserves its SOC WorkforceIn the high-stakes environment of cybersecurity, SOC (Security Operations Center) teams are the first line of defense against constant…Sep 19Sep 19
Data Protection Laws in KSA and UAESince 2022, most countries of the GCC, including Saudi Arabia (“KSA”), and the United Arab Emirates (“UAE”) have adopted personal data…Aug 5Aug 5
The Trust Trap: When Your Cloud Technology Turns into a Phishing ParadiseKeywords: Phishing Websites, Fraud, Scamming, Cloud Technology, Cloud Computing, Phishing Threat, Social Engineering, Fake Websites…Jul 29Jul 29
Bypassing EPP — Chapter 3Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on…Nov 12, 2020Nov 12, 2020
Bypassing EPP — Chapter 2The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to…Sep 17, 2020Sep 17, 2020
Fuites d’infos sur le Dark WebSecteurs pharmaceutique et agroalimentaire en FranceSep 7, 2020Sep 7, 2020