Horangi

Welcome to Horangi's Media Blog

There is no off switch on a Tiger

Latest stories

Seeing the Forest through the Trees:  Adopting a Holistic Approach to Cyber Security

A Brave New World

4 Key Things Enterprises Need to Know About Cyber Espionage

Source: Bridge of Spies, Source: https://c1.staticflickr.com/6/5745/22762260847_a90227cf47_b.jpg, Accessed: 6 April, 2018 When we talk about espionage, most thoughts would be of spies from old cold war flicks, infiltrating top secret government...

Protecting Yourself from Social Engineering Attacks

In the realm of cyber security, one thing is clear: the weakest link in any security system is the human being. One can have the most state-of-the-art, bulletproof cybersecurity process in the world, but without understanding the nature of a human...

Real Life Examples Of Web Vulnerabilities (Revised with OWASP 2017)

 Since the previous review of web vulnerabilities mapped to the OWASP Top 10 previously published on Apr 10, 2017, the awareness document has been updated to reflect the current risk trends related to web applications. This document is meant as a...

The Events Horangi Attended during Q1

ICO conference, 16th Jan

Website

Horangi Cyber Security Blog

More information

Horangi

Visit our support center and talk to our experts about your security issues, questions and needs.

Join the conversation
Become the tiger of your mountain with our full-spectrum cyber security services.

Become the tiger of your mountain with our full-spectrum cyber security services.

Learn more