Brand Protection, Fraud Detection What is JavaScript Dependency Injection (with examples)? By Ran Arad July 5, 2023
Brand Protection, Fraud Detection 10 Ways Threat Detection is Evolving in 2023 By Eran Tsur June 21, 2023
Brand Protection, Customer Journey PII vs PHI: Which Should You Be Concerned With Protecting? By Eran Tsur May 18, 2023
Brand Protection, Customer Journey End game: Why InfoSec Must Stop Playing Cat & Mouse By Eran Tsur May 11, 2023
Brand Protection, Fraud Detection Real-time Security Monitoring: Why it’s The Missing Piece in a Secure Perimeter By Eran Tsur May 4, 2023
Brand Protection, Fraud Detection A Step-by-Step Guide to Brand Hijacking Attacks and How to Prevent Them By Eran Tsur April 27, 2023
Brand Protection, Fraud Detection What is Domain Hijacking and How to Prevent It By Eran Tsur April 21, 2023
Brand Protection 7 Examples of Threat Modeling That Create Secure Design Patterns By Eran Tsur March 21, 2023
Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025 September 26, 2025