Check out the Cybersecurity and Compliance Assessment

Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture.

View Assessment

The Insider Threat

Miguel Clarke, GRC and Cyber Security Evangelist, gives his views on how organizations can protect themselves against insider threat attacks.

View More

Forrester's Total Economic Impact Report of Armor Anywhere

Discover the true ROI of Armor’s cloud security solution Armor Anywhere.

Check it out

2024 Predictions

With technology continually evolving, cyber criminals will continue to pose a significant challenge to individuals, businesses and organisations during 2024. But what are the key threats we should look out for over the next 12 months? In this blog post, Temi Akinlade, GRC/P Security Advisor at Armor offers his thoughts.

View More

Email Security Best Practice

Email security is a huge issue to consider as part of your overall cybersecurity posture. Here our GRC/P Security Advisor Temi Akinlade offers some best practice advice on how to approach it.

View More
Tokyo City, Japan

Building Resilience in Cybersecurity: Protecting Our Digital Frontiers

In today’s hyper-connected world, where information flows freely and technology permeates every aspect of our lives, the need for robust cybersecurity measures has never been more critical. Cyber threats continue to evolve at an alarming rate, targeting individuals, businesses, and even nations. As cybercriminals employ increasingly sophisticated tactics, organizations must cultivate resilience to withstand and […]

View More

Log4Shell in a Nutshell: Armor Unpacks the Prolific Zero-Day Attack

Within a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center.  The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]

View More