News

Cybercrime – what’s at stake?

Cybercriminals use malware for many reasons, the most important being: Identity theft by tricking a t...
Read more

Welcoming DORA… another star on the stage of compliance!

The Digital Operational Resilience Act (DORA) is a regulation that aims to strengthen the IT security offina...
Read more

Most commonly used in phishing attacks…

In this article, we'll explore trends in documents used in phishing attacks. The purpose of suchan attack is...
Read more

NIS2 – in anticipation of October 2024…

The NIS Directive is a step in the right direction for cybersecurity – therefore for our data andthe service...
Read more

SIEM, SOAR, and XDR basics for Security Analysts

In the ever-evolving landscape of cybersecurity, security analysts face a myriad of challenges. With an incr...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info