News

Report: The striking collapse of the handoff window
27 March 2026

Report: The striking collapse of the handoff window

In 2022, the median time between an initial access event and the hand-off to a secondary threat group was over 8 hours. By 2025, that window shrank to a median of just 22 seconds.

3 weeks ago
Poisoning AI training data is even easier than we think
19 March 2026

Poisoning AI training data is even easier than we think

By now, we know that AI chatbots can occasionally produce incorrect information. But do we really understand how easily those errors can be engineered?

4 weeks ago

Blogs

Looking ahead in an overheated threat landscape
24 March 2026

Looking ahead in an overheated threat landscape

The wave of ransomware that is no longer a risk, but a statistical certainty. We don’t even talk about DDoS attacks anymore. Suppliers falling victim, where the question is no longer whether our data is out in the open, but when we’ll find out.
3 weeks ago
Is the pentester the next dodo of the tech industry?
24 February 2026

Is the pentester the next dodo of the tech industry?

With last week's launch of Claude Code Security, Anthropic makes one thing clear: AI doesn't stop at writing code; it's also starting to cannibalize the role of cybersecurity auditor.
2 months ago

Documents

Advancing security and governance across emerging technologies

Cyber resilience goes beyond compliance. This HRO session shows why adaptive governance is becoming a critical driver of strategic agility and future earning capacity.

2 months ago

State of Cybersecurity 2025

For most of the 2020s, the technology industry seemed to be an irresistible force. During the pandemic, technology products and occupations were held up as the key drivers enabling pivots to...

Piet-Hein van Santvoort
1 year ago

Q&A

Usage of public wifi

We are currently reconsidering our travel policy. Under the current policy, employees are not allowed to use public or hotel Wi-Fi networks. However, I believe that the risk of allowing this might not be that significant. Our devices connect to the network via a VPN tunnel. What is the policy in your...

8 months ago