How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack CampaignRead Now
Featured Post -

Spin.AI Blog

How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack Campaign

The browser extension ecosystem just experienced one of its most sophisticated attacks to date. What began as an initial malicious extension discovery by Koi Security has...

Read More
How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack Campaign
×
What You Should Know About Homomorphic Encryption

What You Should Know About Homomorphic Encryption

There is a weakness with traditional encryption techniques. What is that weakness? Also, what is...

Sergiy Balynsky - VP of Engineering Spin.AI

VP of Engineering

Read more
3 Shadow IT Tools and 4 Rules to Manage Risky Apps

3 Shadow IT Tools and 4 Rules to Manage Risky Apps

The number of employees who admit to using unauthorized apps, devices, or other technologies at...

Avatar photo

Vice President of Product

Read more
How to Bolster Compliance with SaaS Security Automation

How to Bolster Compliance with SaaS Security Automation

A pressing challenge for businesses today in addition to SaaS security is compliance. No matter...

Avatar photo

Vice President of Product

Read more
How to Close Security Gap of Evolving Cloud Ransomware

How to Close Security Gap of Evolving Cloud Ransomware

It can be one of the most feared words in cybersecurity – cloud ransomware. Ransomware...

Avatar photo

Vice President of Product

Read more
Google Drive™ Encryption. Ultimate Guide for Admins

Google Drive™ Encryption. Ultimate Guide for Admins

Storing information, including sensitive information in the public cloud can be worrisome for businesses. Countless...

Avatar photo

CEO and Founder

Read more
How to Mitigate Advanced Threats and Attacks against Cloud Service Providers

How to Mitigate Advanced Threats and Attacks against Cloud Service ...

The world of cybersecurity threats is a diverse and very threatening world filled with many...

Avatar photo

Vice President of Product

Read more
How to Disconnect Apps from Google Drive™?

How to Disconnect Apps from Google Drive™?

Google Drive™ is a popular cloud-based document storage platform that enables users to store, organize,...

Avatar photo

Vice President of Product

Read more
Cloud SaaS Backup Policies Guide: What, Why, When, How

Cloud SaaS Backup Policies Guide: What, Why, When, How

Many areas can lead to gaps in cybersecurity. However, an area often overlooked in the...

Avatar photo

Vice President of Product

Read more
Best Practices: Mitigating Insider Threats & Misuse of Data

Best Practices: Mitigating Insider Threats & Misuse of Data

When businesses think about cybersecurity threats, often the focus is on cybersecurity risks from the...

Avatar photo

Director of Support

Read more
How to Monitor your SaaS Environment – Best Practices

How to Monitor your SaaS Environment – Best Practices

Monitoring your environment, whether on-premises or in the cloud, is the “lifeblood” of cybersecurity. There...

Avatar photo

Director of Support

Read more
GroupHugs Relies on SpinOne’s Proactive SaaS Ransomware Protection

GroupHugs Relies on SpinOne’s Proactive SaaS Ransomware Prote...

Background Industry: Social Media Marketing Agency Use Case: Ransomware Protection, Shared Items Control, Security Monitoring...

Avatar photo

Vice President of Product

Read more
Microsoft 365: Effective SaaS Backup Solutions Overview

Microsoft 365: Effective SaaS Backup Solutions Overview

Organizations worldwide have been accelerating their migrations to the cloud. In addition, prompted by the...

Avatar photo

Vice President of Product

Read more
Microsoft 365 vs. Office 365: How Backup & Ransomware Companies Confuse Buyers

Microsoft 365 vs. Office 365: How Backup & Ransomware Companie...

When choosing Microsoft products, buying team might get confused due to the abundance of products...

Avatar photo

Product Manager

Read more
Spin Technology Adds New Security Features to SpinOne Microsoft 365

Spin Technology Adds New Security Features to SpinOne Microsoft 365

SpinOne continues to innovate and provide the features and capabilities allowing organizations to stay ahead...

Avatar photo

Vice President of Product

Read more
White House Cybersecurity Initiatives and Increased Spending

White House Cybersecurity Initiatives and Increased Spending

Recently we’ve seen new White House cybersecurity initiatives. What are these? How does this affect...

Avatar photo

CEO and Founder

Read more
The Most Recent Cyberattacks – July 2021

The Most Recent Cyberattacks – July 2021

Many companies do not perceive cyber incidents as likely events. Such perception creates a false...

Avatar photo

Product Manager

Read more
Cloud Application Security Risk Assessment Checklist

Cloud Application Security Risk Assessment Checklist

Article Summary:The article presents a comprehensive checklist to help businesses evaluate the security risks and...

Avatar photo

Vice President of Product

Read more
Step-By-Step OneDrive File Recovery for Office 365 Admins

Step-By-Step OneDrive File Recovery for Office 365 Admins

Article Summary:This article provides a detailed step-by-step guide for Microsoft 365 admins on how to...

Avatar photo

Product Manager

Read more

Recognition