top of page


Breach costs are mounting - a glimpse into recent attacks
The costs of data breaches and cyber attacks are becoming all too visible. Here's some recent examples from mostly U.S. based organizations.
Oct 11, 2023


Supply chain risks: the MOVEit fallout is getting bigger
MOVEit software is reminding everybody of the risks and the far reaching impact when a vulnerability propagates through a supply chain.
Oct 5, 2023


The last line of defense? Employees
Security awareness trainings (SAT) are becoming an important service offering for any IT services provider (MSSPs). See what's important.
Sep 29, 2023
![[Video] Managing Risks In OT Environments - Mreža Smart Day Event](https://static.wixstatic.com/media/83b8eb_9978b4abbc9d4ba5a5bd44a69dc1e8f4~mv2.png/v1/fill/w_334,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/83b8eb_9978b4abbc9d4ba5a5bd44a69dc1e8f4~mv2.webp)
![[Video] Managing Risks In OT Environments - Mreža Smart Day Event](https://static.wixstatic.com/media/83b8eb_9978b4abbc9d4ba5a5bd44a69dc1e8f4~mv2.png/v1/fill/w_297,h_222,fp_0.50_0.50,q_95,enc_avif,quality_auto/83b8eb_9978b4abbc9d4ba5a5bd44a69dc1e8f4~mv2.webp)
[Video] Managing Risks In OT Environments - Mreža Smart Day Event
In collaboration with Mreža Smart Day, we've organized an event with panel discussion on risk management in OT. Watch the full recording.
Sep 28, 2023


The increased coverage and scope under NIS2
NIS2 directive is due for enforcement a year from now. What is the expanded scope and which organizations will be affected?
Sep 26, 2023


EDR vs XDR: what's the important difference?
Endpoint detection and response (EDR) technology has certainly improved the security posture of many organizations: by scanning for...
Sep 21, 2023


Raging network devices vulnerabilities
From Fortinet, over Citrix and Juniper to Cisco VPN - internet facing devices are a critical part of the attack surface. Many are vulnerable
Sep 19, 2023


Monitoring entitlements for application identities - a look at Microsoft Azure AD
Automated scripts and tasks are expanding the attack surface: they often include privileged credentials. It's important to monitor them.
Sep 13, 2023


Event: Cyber Risk Management in OT Environments
Join the free event and find out how OT differs from IT security, how to increase visibility in OT and manage risks effectively, and more.
Sep 5, 2023
bottom of page
