The Insider Threat

Miguel Clarke, GRC and Cyber Security Evangelist, gives his views on how organizations can protect themselves against insider threat attacks.

View More

Check out the Cybersecurity and Compliance Assessment

Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture.

View Assessment

2024 Predictions

With technology continually evolving, cyber criminals will continue to pose a significant challenge to individuals, businesses and organisations during 2024. But what are the key threats we should look out for over the next 12 months? In this blog post, Temi Akinlade, GRC/P Security Advisor at Armor offers his thoughts.

View More

Email Security Best Practice

Email security is a huge issue to consider as part of your overall cybersecurity posture. Here our GRC/P Security Advisor Temi Akinlade offers some best practice advice on how to approach it.

View More
Tokyo City, Japan

Building Resilience in Cybersecurity: Protecting Our Digital Frontiers

In today’s hyper-connected world, where information flows freely and technology permeates every aspect of our lives, the need for robust cybersecurity measures has never been more critical. Cyber threats continue to evolve at an alarming rate, targeting individuals, businesses, and even nations. As cybercriminals employ increasingly sophisticated tactics, organizations must cultivate resilience to withstand and […]

View More

Forrester's Total Economic Impact Report of Armor Anywhere

Discover the true ROI of Armor’s cloud security solution Armor Anywhere.

Check it out

Log4Shell in a Nutshell: Armor Unpacks the Prolific Zero-Day Attack

Within a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center.  The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]

View More

Anatomy of Compliance Audits

Compliance audits can be quite intimidating, especially if you’re new to them. For many organizations, it’s something that’s becoming increasingly unavoidable. In this post, we introduce you to the various aspects of an audit, what an auditor expects from you (the complying organization), and what you can do to make the auditing process as smooth […]

View More

Security Insights – Q2 2021 Updates

Threat Analyst Lead Yaz Johnston dives into our latest security insights, where you can learn about upcoming HTML sanitization for your favorite web browsers, what top 10 malware threats we’ve seen in the past quarter, and how ransomware continues to steal the security spotlight. HTML Sanitization Google, Mozilla, and security firm Cure53 announced they are […]

View More

Creating a Culture of Compliance

Joint Blog with HIPAATrek, Co-Author: Sarah Badahman, CHPSE, CEO/Founder, HIPAAtrek Office culture has greatly evolved over the years, impacted by generational differences, laws and legislature, and even design aesthetics. And as technology has changed, one of the most impactful influences on office culture has been digital transformation. Fueled by growing usage of applications, remote work […]

View More