Bora
  • Services
    • Backlink Strategy
    • Campaign Kits
    • Content Creation
    • Customer Advocacy
    • Email Marketing
    • Employee Advocacy
    • Graphic Design
    • Pillar Pages
    • Social Media Account Management
    • Translation Services
  • Resources
    • Case Studies
    • Cybersecurity Glossary
    • Marketing Glossary
  • Blog
  • About Us
    • Bora People
    • Generative AI and B2B Cybersecurity Content Marketing
  • Contact Us
    • Schedule a Discovery Call
Select Page
What Is a Pillar Page? Building Page Authority in Cybersecurity

What Is a Pillar Page? Building Page Authority in Cybersecurity

by Joe Pettit | Nov 17, 2021 | Marketing

In the cybersecurity marketing world, we hear a lot of terms thrown around when we talk about content marketing. Search Engine Optimization (SEO)…Domain Authority…Search Engine Results Pages (SERP)…these are just a few terms that are often used. However, one term that...
Search Service Algolia – Optimize Your Expanding Website

Search Service Algolia – Optimize Your Expanding Website

by Joe Pettit | Aug 26, 2020 | Marketing

Why use the search service Algolia? Well, when your website reaches a certain size, you may start to become a victim of your own success. Because of the sheer volume of content, stuff that may be of interest starts to get hidden from your visitors. This is equally...
Joe Pettit Interviewed on The Human Factor Security Podcast

Joe Pettit Interviewed on The Human Factor Security Podcast

by Joe Pettit | Feb 7, 2020 | Bora News

In this podcast, Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life. Listen in as we hear Joe and Jenny discuss the benefits of remote working especially across timezones, breaking news stories and how marketing...
Avoid Post Plummeting and Learn to Soar within Social Media

Avoid Post Plummeting and Learn to Soar within Social Media

by Joe Pettit | Feb 5, 2020 | Marketing

“That wasn’t flying, that was falling with style.” Woody’s line from Toy Story is probably the best way to describe how social media posts work. No one truly flies because the gravity in the Social Media world is strong. In the world of Social Media, algorithms are...
Looking back at 2019: Your Best Cybersecurity Moments

Looking back at 2019: Your Best Cybersecurity Moments

by Joe Pettit | Dec 18, 2019 | Cybersecurity

2019 is almost over! What a year it’s been in the world of cybersecurity and to celebrate, we wanted to ask a range of cybersecurity experts what their most memorable event was for them. We hope you like their answers! Zoë Rose – @RoseSecOps My cybersecurity...
« Older Entries
Next Entries »

Recent Posts

  • Can We Rely on AI Detectors?
  • The Benefits of the New Features at Gartner Peer Insights
  • The Benefits of Social Media Management in Cybersecurity Marketing
  • Know Your Audience and Cater to Them: Our Advice
  • Bluesky
  • Instagram
  • X
  • Facebook
  • LinkedIn
  • RSS Feed

Categories

Bora News (5) Cybersecurity (111) Marketing (131) Security News Homepage (1) Uncategorized (1)
  • Terms & Conditions
  • Copyright Notice
  • Privacy Policy
  • CV Privacy Notice
  • Cookie Policy
  • AI Policy

Schedule a call with Bora

Explore

  • Home
  • Blog
  • About Us
  • Contact Us
  • FAQ
  • Join our Monthly Newsletter
  • Resources

Policy

  • Terms & Conditions
  • Copyright Notice
  • Privacy Policy
  • CV Privacy Notice
  • Cookie Policy
  • AI Policy
  • Facebook
  • X
  • Instagram
  • RSS

Designed by Elegant Themes | Powered by WordPress

Bora
Manage Cookie Consent
Our website uses cookies to provide you with the best experience, to measure its traffic and improve your browsing, as well as to provide you with our newsletter and keep our website secure.

You may "ACCEPT ALL COOKIES," or you may accept “ONLY STRICTLY NECESSARY COOKIES.” Otherwise, you may determine your preferences via the "SETTINGS" button. Learn more about the use of cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Settings
{title} {title} {title}