top of page


Raging network devices vulnerabilities
From Fortinet, over Citrix and Juniper to Cisco VPN - internet facing devices are a critical part of the attack surface. Many are vulnerable
Sep 19, 2023


Event: Cyber Risk Management in OT Environments
Join the free event and find out how OT differs from IT security, how to increase visibility in OT and manage risks effectively, and more.
Sep 5, 2023


Security Awareness Trainings in Focus
In the most recent attacks against Microsoft365, attackers are again betting on phishing or electronically delivered social engineering,...
Aug 28, 2023


CISA effectively mandates the SASE architecture
U.S. CISA agency is effectively mandating to close public access to any VPN, HTTP(S), RDP or other public facing interface. What's going on?
Aug 24, 2023


NIS2 risk management measures
Threat actors are learning and innovating fast, as evidenced by increasingly sophisticated and frequent cyberattacks. Regulators and law...
Aug 24, 2023


Microsoft Zero Days: The Urgency of Patching and Continuous Security Training
Luring unsuspecting users to open Microsoft Office documents to deliver malware is as old as the internet. A recent zero-day...
Aug 16, 2023


Harnessing the Pareto Principle in Risk Management
80% risks can be managed with just 20% of efforts? The Pareto 80/20 rule is a useful concept in risk management.
Aug 13, 2023


OT Cybersecurity Regulations Evolving
Trends in Operational Technology (OT) standards and regulations - focus on managing cyber risks.
Aug 10, 2023


Phishing attacks bypassing MFA - again
Examples of recent phishing attempts show that even popular MFA methods (such as smartphone push based notifications) are becoming obsolete.
Aug 7, 2023
bottom of page
