News
Cyber as the second front line: what Iranian cyber operations mean for CISOs
Since the start of the joint U.S.–Israeli operation earlier this year, the conflict has extended beyond the physical battlefield into cyberspace.
Report: The striking collapse of the handoff window
In 2022, the median time between an initial access event and the hand-off to a secondary threat group was over 8 hours. By 2025, that window shrank to a median of just 22 seconds.
Blogs
Looking ahead in an overheated threat landscape
Is the pentester the next dodo of the tech industry?
Documents
Advancing security and governance across emerging technologies
Cyber resilience goes beyond compliance. This HRO session shows why adaptive governance is becoming a critical driver of strategic agility and future earning capacity.
State of Cybersecurity 2025
For most of the 2020s, the technology industry seemed to be an irresistible force. During the pandemic, technology products and occupations were held up as the key drivers enabling pivots to...
Q&A
Usage of public wifi
We are currently reconsidering our travel policy. Under the current policy, employees are not allowed to use public or hotel Wi-Fi networks. However, I believe that the risk of allowing this might not be that significant. Our devices connect to the network via a VPN tunnel. What is the policy in your...




