top of page


Threat Actors Entrenched in Critical Infrastructure
State sponsored threat actors have persistent access across critical infrastructure companies. Why is that so?
Feb 7, 2024


Querying vulnerable OT devices in the Adriatics
Most attacks against organizations with industrial control systems (ICS) or operational technology (OT) are still the usual ransomware...
Jan 5, 2024


Cybersecurity regulation - the Croatia example
How will the NIS2 implementation look in Croatia, a typical regional EU member? Lots of stakeholders and coordination ahead.
Nov 10, 2023


Cyber risk analysis is maturing
Driven by an unlikely actor, the U.S. Securities and Exchange Commission, quantitative cyber risk assessment and analysis is evolving.
Oct 17, 2023


EDR vs XDR: what's the important difference?
Endpoint detection and response (EDR) technology has certainly improved the security posture of many organizations: by scanning for...
Sep 21, 2023


Monitoring entitlements for application identities - a look at Microsoft Azure AD
Automated scripts and tasks are expanding the attack surface: they often include privileged credentials. It's important to monitor them.
Sep 13, 2023
bottom of page
