Brand Protection, Fraud DetectionWhat is JavaScript Dependency Injection (with examples)? By Ran Arad July 5, 2023
Brand Protection, Fraud Detection10 Ways Threat Detection is Evolving in 2023 By Eran Tsur June 21, 2023
Brand Protection, Customer JourneyPII vs PHI: Which Should You Be Concerned With Protecting? By Eran Tsur May 18, 2023
Brand Protection, Customer JourneyEnd game: Why InfoSec Must Stop Playing Cat & Mouse By Eran Tsur May 11, 2023
Brand Protection, Fraud DetectionReal-time Security Monitoring: Why it’s The Missing Piece in a Secure Perimeter By Eran Tsur May 4, 2023
Brand Protection, Fraud DetectionA Step-by-Step Guide to Brand Hijacking Attacks and How to Prevent Them By Eran Tsur April 27, 2023
Brand Protection, Fraud DetectionWhat is Domain Hijacking and How to Prevent It By Eran Tsur April 21, 2023
Brand Protection7 Examples of Threat Modeling That Create Secure Design Patterns By Eran Tsur March 21, 2023
Brand ProtectionClone Phishing Attacks: 3 Ways To Protect Your Organization By Eran Tsur December 21, 2022
Social Engineering Tactics 2026: How Attackers Are shifting from Email to ‘Swipe-Up’ Scams December 23, 2025