Skip to content
e43c441c-4751-4b39-9b2c-455b409ed373

OXEN Technology Insights

Get the latest news, trends and advancements from OXEN.
Kelle WhiteJan 18, 2024

Why Businesses Should Be Concerned about AI and Cyber Attacks

Hacking methodologies have improved over the years. The moment a new IT program or ...
Start Reading
Kelle WhiteJan 11, 2024

How Is AI Used in Cybersecurity Especially in Hacking?

Artificial intelligence has found many excellent uses in business in the past year. In ...
Start Reading
Kelle WhiteJan 4, 2024

How Do Hackers Use AI?

Artificial intelligence has been a key ingredient in propelling businesses ...
Start Reading
Kelle WhiteDec 20, 2023

Role of Cybersecurity Training in Compliance and Risk Reduction

The primary reason for training employees on cybersecurity is to protect the organization ...
Start Reading
Kelle WhiteDec 13, 2023

Phishing and Social Engineering Training

Companies have tried many methods to train employees about phishing and social ...
Start Reading
Kelle WhiteDec 6, 2023

Top Mistakes to Avoid When Training Staff on Cybersecurity

As technology continues to advance, so do the techniques used by hackers. We must keep up ...
Start Reading
Kelle WhiteNov 29, 2023

How Hackers Use Social Engineering Tactics in Phishing Scams

Social engineering is quite a buzzword these days in the world of cybersecurity. But what ...
Start Reading
Kelle WhiteNov 15, 2023

Training Employees to Spot Social Engineering

Social engineering is one of the newest methods hackers use to access sensitive ...
Start Reading
Kelle WhiteNov 8, 2023

Top 8 Phishing Scam Tactics and How to Identify Them

Phishing has been a common hacking method for over two decades now. You would think that ...
Start Reading
Kelle WhiteOct 24, 2023

Is Your Organization Prepared to Respond to a Security Incident?

One cybersecurity incident takes place every 14 seconds. Contrary to common assumptions, ...
Start Reading
Kelle WhiteOct 11, 2023

The Top 7 Mobile Security Threats to Address in Your BYOD Policy

BYOD or Bring Your Own Device is a modern practice where employees use their personally ...
Start Reading
Kelle WhiteOct 4, 2023

Why Cybersecurity Insurance Matters

As businesses move forward into a digital environment, cybersecurity insurance becomes ...
Start Reading