Cybersecurity in the Age of Deep Fakes: Dealing with AI-Powered ThreatsThe rapid rise of artificial intelligence (AI) has led to both incredible advancements and new challenges, particularly in the field of…Jan 24Jan 24
The Story Behind Potech’s PartnershipsWe’ve been regularly announcing new partners, including VADs (Value-Added Distributors) and VARs (Value-Added Resellers). Beyond the…Nov 5, 2024Nov 5, 2024
The Wolf in Scholar’s ClothingHow Hackers Are Using Trusted Platforms to Go UndetectedNov 5, 2024Nov 5, 2024
Le Double Rôle de l’Intelligence Artificielle en CybersécuritéL’intelligence artificielle (IA) s’impose désormais comme nécessité en matière de cybersécurité, offrant des outils puissants pour…Sep 23, 2024Sep 23, 2024
Combating SOC Fatigue: How Potech Preserves its SOC WorkforceIn the high-stakes environment of cybersecurity, SOC (Security Operations Center) teams are the first line of defense against constant…Sep 19, 2024Sep 19, 2024
Data Protection Laws in KSA and UAESince 2022, most countries of the GCC, including Saudi Arabia (“KSA”), and the United Arab Emirates (“UAE”) have adopted personal data…Aug 5, 2024Aug 5, 2024
The Trust Trap: When Your Cloud Technology Turns into a Phishing ParadiseKeywords: Phishing Websites, Fraud, Scamming, Cloud Technology, Cloud Computing, Phishing Threat, Social Engineering, Fake Websites…Jul 29, 2024Jul 29, 2024
Bypassing EPP — Chapter 3Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on…Nov 12, 2020Nov 12, 2020
Bypassing EPP — Chapter 2The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to…Sep 17, 2020Sep 17, 2020