Opinion: Various articles from our colleagues and friends.

Former Cheltenham Researcher and friend & associate of Mollis Group “B4by L1z4rd” flips the narrative on Social Engineering for this month’s guest blog.

What is Social Engineering?

At its core, social engineering or ‘SE’ is the construction and leveraging of influence in order to manipula...

Read More...

This week’s guest blog has been written by a long standing friend of Mollis Group who is a current serving CISO for a very well known food & beverage company. There are some great tips in here that can be implemented quickly for both the personal and business user at very little cost.

Credential S...

Read More...

As a CISO, you are responsible for securing information technology for your company, partners and customers. Cloud security transformation requires a holistic approach to migration so that you can manage risks in the new cloud environment and leverage the opportunities of cloud security for your tea...

Read More...

Cloud migration. The Final Frontier. And one of the most complex when you’ve been running workloads on-premises for years, but it can be done.

What you need to know about cloud migration

To be successful, you need a clearly defined, well-researched, and coherent strategy. Any approach that doesn...

Read More...

Spear phishing is a type of social engineering attack during which a perpetrator that is disguised as a trusted individual, will trick their victim into clicking an embedded link in an email, text message or Instant Message which will then cause the victim to install malware on their network and sub...

Read More...

We wanted to write an article which is aimed at those of you that are just like us and either own or are considering owning a WordPress powered website. You may even be using WordPress purely for your website Content Management System (CMS).

We have an OUTSTANDING graphic designer / web developer...

Read More...

Let us know what you are solving for, we'll help you find a secure solution.