top of page


NIS2 risk management measures
Threat actors are learning and innovating fast, as evidenced by increasingly sophisticated and frequent cyberattacks. Regulators and law...
Aug 25, 2023

Microsoft Zero Days: The Urgency of Patching and Continuous Security Training
Luring unsuspecting users to open Microsoft Office documents to deliver malware is as old as the internet. A recent zero-day...
Aug 17, 2023

Harnessing the Pareto Principle in Risk Management
80% risks can be managed with just 20% of efforts? The Pareto 80/20 rule is a useful concept in risk management.
Aug 14, 2023


OT Cybersecurity Regulations Evolving
Trends in Operational Technology (OT) standards and regulations - focus on managing cyber risks.
Aug 11, 2023


Phishing attacks bypassing MFA - again
Examples of recent phishing attempts show that even popular MFA methods (such as smartphone push based notifications) are becoming obsolete.
Aug 7, 2023


Zero days weaponized on edge devices and servers: rethink your risks
Vulnerabilities in public facing edge devices and apps are being exploited prior to disclosure, let alone patching. Several lessons learned.
Aug 1, 2023


CPS risk management - what's it about?
Risk management in OT environments is different than traditional IT. Hence the rise of OT risk management software.
Jul 28, 2023

SASE architecture - a blueprint for MSSPs
Managing IT security, connecting branches and remote users - all this requires too much work. A new architecture is required.
Jul 25, 2023


Access controls and data-at-rest encryption go hand in hand
Sensitive data exfiltration by way of internal or external malicious users requires rethinking access control and data-at-rest encryption.
Jul 21, 2023
bottom of page