White List Matter
The world of data filtering relies on two fundamental techniques to segregate information: applying blacklisting or whitelisting...
The world of data filtering relies on two fundamental techniques to segregate information: applying blacklisting or whitelisting...
Hackers will use any and every avenue of attack to gain access to your vital information and sensitive data...
On May 11, 2020, one of our executives received an email containing a malicious Excel 4.0 file (an Excel format from the 90s), that bypassed the Microsoft 365 security system and arrived at her inbox. Our executive wasn't alone.
odix Newsletter
Subscribe to odix newsletter and get cyber content to your inbox