Need for cyber risk management greater than ever
22 July 2024

Need for cyber risk management greater than ever

Most organizations do not have the required resources to implement the most advanced cybersecurity controls in all areas. Their key challenge is to ensure that the available resources are allocated towards...

1 year ago
“AI allows us to upskill our entire team”
5 July 2024

“AI allows us to upskill our entire team”

By implementing AI and automation tools in the right way, a significant opportunity arises to drive career growth in security teams, according to Ian Stacey, Group Head of Information Security at Novuna and Cal

1 year ago
"Threat actors are increasingly targeting OT organizations," report
3 July 2024

"Threat actors are increasingly targeting OT organizations," report

The results represent the current state of operational technology (OT) security and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In...

1 year ago
Quishing: an evolving threat
24 June 2024

Quishing: an evolving threat

The ongoing changes in QR code phishing, or quishing, show us that it is important to be observant and to not heavily rely on our email security systems.

1 year ago
“NIS2 challenges us CISOs to concretize our work”
24 June 2024

“NIS2 challenges us CISOs to concretize our work”

By making security concrete and tangible, the implementation of NIS2 will create more understanding for the role of CISO, says Justin Broeders, concern-level CISO at the Ministry of Finance.

1 year ago
The three-point action plan for new CISOs
21 June 2024

The three-point action plan for new CISOs

With this ebook, you will: Discover how continuous asset discovery can help you maintain a comprehensive inventory of your organization's IT assets, reducing the risk of undetected vulnerabilities. Learn...

1 year ago
Achieving EU cyber compliance through a comprehensive application security strategy
21 June 2024

Achieving EU cyber compliance through a comprehensive application security strategy

Modern software development heavily relies on third-party and open-source libraries and packages. While these boost efficiency, they also introduce significant risks, which underscore the critical need for...

1 year ago
What’s the cost of downtime?
13 June 2024

What’s the cost of downtime?

Unplanned downtime Last month, Netflix released a documentary series about the Ashley Madison data breach. Ashley Madison, a commercial dating website aimed to enable extramarital affairs, was shut down...

1 year ago
"Wide-ranging fight against cybercrime due to global scale more important than ever"
12 June 2024

"Wide-ranging fight against cybercrime due to global scale more important than ever"

This first edition of the biennial assessment focuses on complex online crime-targeting ICT systems. The report is unique because it provides insight into the cybercrime landscape from an investigation...

1 year ago
Three areas where CISOs can augment their cybersecurity approach
11 June 2024

Three areas where CISOs can augment their cybersecurity approach

To begin the journey toward "augmented cybersecurity," Gartner’s label for a cybersecurity function that has elevated response and recovery to equal status with prevention, CISOs should prioritize three...

1 year ago