Skip to content
zvelo
We Categorize the Web®
zvelozvelo
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlockList™ | Phishing Intelligence
    • Malicious Detailed Detection Feed™ | Malicious Intelligence
    • Cybersecurity Professional Services
  • Solutions
    • Malicious Detection
    • Phishing Detection
    • Web Filtering & Parental Controls
    • Brand Safety & Contextual Targeting
    • Mobile & Subscriber Analytics
  • Resources
    • Threat Intelligence Reports
    • Tech Blog
    • Case Studies
    • zvelo Software Developer Program
Contact UsCheck a URL
  • Products
    • zveloDB™ URL Database
    • zveloCAT™
    • zveloCTI™ Cyber Threat Intelligence
    • PhishBlockList™ | Phishing Intelligence
    • Malicious Detailed Detection Feed™
    • Cybersecurity Professional Services
  • Solutions
    • Malicious Detection
    • Phishing Detection
    • Web Filtering & Parental Controls
    • Brand Safety & Contextual Targeting
    • Mobile and Subscriber Analytics
  • Resources 
    • Threat Intelligence Reports
    • Tech Blog
    • Case Studies
    • Software Developer Program
  • Contact Us
  • zveloLIVE

Yearly Archives: 2019

You are here:
  1. Home
  2. 2019

emotet-resurfaces-after-summer-hiatus

The Resurgence of Emotet

Cybersecurity, Malicious Detection, Phishing Detection, Technology & Insights, URL DatabaseBy zveloOctober 24, 2019

The resurgence of the Emotet trojan reminds us of these 5 habits everyone should develop to maximize your organization’s online security.

unpatched-vulnerabilities-lessons-learned-from-wannacry

Unpatched Vulnerabilities – Lessons Learned from WannaCry

Botnet Detection, Cybersecurity, Information Security, Internet Safety & Privacy, Malicious Detection, Network Security, URL Database, Web Filtering & Parental ControlsBy zveloOctober 11, 2019

Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks?

critical-policies-for-digital-security

Top 5 Critical Security Policies to Enforce

Cybersecurity, DNS Filtering, Information Security, Internet Safety & Privacy, Network Security, Technology & Insights, Web Filtering & Parental ControlsBy zveloOctober 10, 2019

Implementing critical security policies is one thing, but enforcing them is an uphill battle. Here are 5 security battles worth fighting to enforce.

trends-in-cybercrime-diversified-targets

The Cybercrime Trend of Diversified Targets

Cybersecurity, Malicious Detection, Phishing Detection, Technology & InsightsBy zveloOctober 9, 2019

The emerging cybercrime trend of diversifying attack targets demonstrates how criminals are increasingly able to detect and exploit new vulnerabilities.

the-dark-side-of-encryption

The Dark Side of Encryption

Internet Safety & Privacy, Technology & InsightsBy zveloOctober 8, 2019

Increased encryption is drawing scrutiny as it disables organizations that work to filter and block imagery showing the sexual abuse of children.

privacy-vs-security-conundrum

The Privacy vs Security Conundrum

Cybersecurity, Internet Safety & Privacy, Technology & InsightsBy zveloOctober 7, 2019

Today’s world of hyperconnectivity positions privacy vs security as one of the most fiercely contested global debates. Can you have both without compromise?

securing your email - tips for web mail alternatives

Securing Your Email – Tips for Web Mail Alternatives

CybersecurityBy zveloOctober 4, 2019

When it comes to web mail alternatives for securing your email, here are a few “go-to” services combining rich user experiences and no-nonsense security.

the-cost-of-a-data-breach

The Cost of a Data Breach: What’s Really at Stake?

Cybersecurity, Malicious Detection, Phishing Detection, Technology & InsightsBy zveloOctober 3, 2019

The cost of a data breach goes well beyond remediation and recovery. Know your risks. Go below the surface layer to assess what’s actually at stake.

key-steps-to-fortify-defenses-against-phishing

Fortify Your Defenses Against Phishing Attacks

Cybersecurity, Phishing Detection, Technology & InsightsBy zveloOctober 2, 2019

Phishing attacks increasingly focus on people because the human layer is easily exploited. Here are 3 ways to fortify your defenses against phishing.

actionable-steps-to-combat-phishing

Actionable Steps to Combat Phishing

Cybersecurity, Phishing Detection, Technology & InsightsBy zveloOctober 1, 2019

Read the top actionable steps you can take to combat phishing attacks. Cybersecurity Awareness Month is the perfect time to take action with 3 key things you can start doing right now.

1234
2021 zvelo, Inc. All rights reserved.
  • Privacy
  • Legal
More
Go to Top