Cybercrime – what’s at stake?
Cybercriminals use malware for many reasons, the most important being:
Identity theft by tricking a t...
Read more
Welcoming DORA… another star on the stage of compliance!
The Digital Operational Resilience Act (DORA) is a regulation that aims to strengthen the IT security offina...
Read more
Most commonly used in phishing attacks…
In this article, we'll explore trends in documents used in phishing attacks. The purpose of suchan attack is...
Read more
NIS2 – in anticipation of October 2024…
The NIS Directive is a step in the right direction for cybersecurity – therefore for our data andthe service...
Read more
SIEM, SOAR, and XDR basics for Security Analysts
In the ever-evolving landscape of cybersecurity, security analysts face a myriad of challenges. With an incr...
Read more