Cyber Attacks on Critical Infrastructure - how bad is it?



- Nov 20
The Case for Identity Threat Detection and Response
![[Watch Now] - Securing Critical Infrastructure and OT Environments](https://static.wixstatic.com/media/83b8eb_3e9f393ad936408191eaaa3a05aa68e7~mv2.png/v1/fill/w_514,h_386,fp_0.50_0.50,q_95,enc_auto/83b8eb_3e9f393ad936408191eaaa3a05aa68e7~mv2.png)
- Nov 16
[Watch Now] - Securing Critical Infrastructure and OT Environments


- Nov 13
Who Holds the Blame for the Solarwinds hack?


- Nov 10
Cybersecurity regulation - the Croatia example


- Nov 6
Citrix Bleed - a new internet facing vulnerability, again

- Oct 30
Maximize EDR Capabilities with Email Telemetry Data


- Oct 30
NIS2 compliance in OT? Make it easier


- Oct 26
Converging networking and security with single-vendor SASE

- Oct 24
Cybersecurity breaches move markets - the Okta example

- Oct 20
The Cisco IOS XE vulnerability - regional impact

- Oct 18
Watch now: preparing for NIS2 and beyond


- Oct 17
Cyber risk analysis is maturing


- Oct 11
Breach costs are mounting - a glimpse into recent attacks

- Oct 5
Supply chain risks: the MOVEit fallout is getting bigger


- Sep 29
The last line of defense? Employees

- Sep 26
The increased coverage and scope under NIS2


- Sep 21
EDR vs XDR: what's the important difference?


- Sep 19
Raging network devices vulnerabilities


- Sep 13
Monitoring entitlements for application identities - a look at Microsoft Azure AD