News
Latest Articles
Our in-house CISO’s views and advices
Your weekly 3 min must-read
- All Post
- Access Control
- AI
- Blog
- E-crime
- Hot
- Phishing

Subcontractors as a 2.5 party cybersecurity risk and how to manage them Content of This Tutorial 1. What is…

Introduction Remote work and outsourcing is no longer just a trend, but a reality. Yet you can control remote…

Cybersecurity is no longer just about finding and fixing vulnerabilities in your systems and networks. It isalso about anticipating…

Introduction: In today’s digital landscape, organizations face an ever-growing number of cyber threats, with phishing attacks being one of…

Summary: This article explores the reasons why cybersecurity professionals are leaving their jobs. It also provides some recommendations on…

Cyber risk is a fundamental component of the overall risk faced by any organization. In order to plan the…

Cybersecurity has never been more important. More and more companies are moving their services online, and with the rise…

Introduction In a shocking turn of events, hosting providers CloudNordic and AzeroCloud, based in Denmark, recently suffered a devastating…

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating…