PotechThe Story Behind Potech’s PartnershipsWe’ve been regularly announcing new partners, including VADs (Value-Added Distributors) and VARs (Value-Added Resellers). Beyond the…1d ago1d ago
PotechThe Wolf in Scholar’s ClothingHow Hackers Are Using Trusted Platforms to Go Undetected1d ago1d ago
PotechLe Double Rôle de l’Intelligence Artificielle en CybersécuritéL’intelligence artificielle (IA) s’impose désormais comme nécessité en matière de cybersécurité, offrant des outils puissants pour…Sep 23Sep 23
PotechCombating SOC Fatigue: How Potech Preserves its SOC WorkforceIn the high-stakes environment of cybersecurity, SOC (Security Operations Center) teams are the first line of defense against constant…Sep 19Sep 19
PotechData Protection Laws in KSA and UAESince 2022, most countries of the GCC, including Saudi Arabia (“KSA”), and the United Arab Emirates (“UAE”) have adopted personal data…Aug 5Aug 5
PotechThe Trust Trap: When Your Cloud Technology Turns into a Phishing ParadiseKeywords: Phishing Websites, Fraud, Scamming, Cloud Technology, Cloud Computing, Phishing Threat, Social Engineering, Fake Websites…Jul 29Jul 29
PotechBypassing EPP — Chapter 3Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on…Nov 12, 2020Nov 12, 2020
PotechBypassing EPP — Chapter 2The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to…Sep 17, 2020Sep 17, 2020
PotechFuites d’infos sur le Dark WebSecteurs pharmaceutique et agroalimentaire en FranceSep 7, 2020Sep 7, 2020
PotechGDPR: a year laterThe General Data Protection Regulation (GDPR) came into force on 25th May 2018 to reinforce data protection while also providing enhanced…Sep 1, 2020Sep 1, 2020