News

Cyber as the second front line: what Iranian cyber operations mean for CISOs
30 March 2026

Cyber as the second front line: what Iranian cyber operations mean for CISOs

Since the start of the joint U.S.–Israeli operation earlier this year, the conflict has extended beyond the physical battlefield into cyberspace.

4 weeks ago
Report: The striking collapse of the handoff window
27 March 2026

Report: The striking collapse of the handoff window

In 2022, the median time between an initial access event and the hand-off to a secondary threat group was over 8 hours. By 2025, that window shrank to a median of just 22 seconds.

1 month ago

Blogs

Looking ahead in an overheated threat landscape
24 March 2026

Looking ahead in an overheated threat landscape

The wave of ransomware that is no longer a risk, but a statistical certainty. We don’t even talk about DDoS attacks anymore. Suppliers falling victim, where the question is no longer whether our data is out in the open, but when we’ll find out.
1 month ago
Is the pentester the next dodo of the tech industry?
24 February 2026

Is the pentester the next dodo of the tech industry?

With last week's launch of Claude Code Security, Anthropic makes one thing clear: AI doesn't stop at writing code; it's also starting to cannibalize the role of cybersecurity auditor.
2 months ago

Documents

Advancing security and governance across emerging technologies

Cyber resilience goes beyond compliance. This HRO session shows why adaptive governance is becoming a critical driver of strategic agility and future earning capacity.

3 months ago

State of Cybersecurity 2025

For most of the 2020s, the technology industry seemed to be an irresistible force. During the pandemic, technology products and occupations were held up as the key drivers enabling pivots to...

Piet-Hein van Santvoort
1 year ago

Q&A

Usage of public wifi

We are currently reconsidering our travel policy. Under the current policy, employees are not allowed to use public or hotel Wi-Fi networks. However, I believe that the risk of allowing this might not be that significant. Our devices connect to the network via a VPN tunnel. What is the policy in your...

9 months ago