The first step in fixing any IAM problem is to understand it. basically Common...

The first step in fixing any IAM problem is to understand it. basically Common...
Automated Threats in the retail sector According to the most recent studies,...
Cyber-Attacks Set To Become "Uninsurable" This is the stark assessment from...
Transforming risk into an advantage The need for a conscious and holistic approach to governance, evidently risk and compliance (GRC) has never been more critical for organizations. As the business...
Cybersecurity Law Code There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the...
Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. They key is... Ransomware attack, and pay or not. The 64%...
Cyber resilience refers to the ability to protect electronic data and systems from cyberattacks. As well as to quickly resume business operations in the event of a successful attack. According to Statista, 37% of organisations globally became a victim to a ransomware...
Cyberattacks against the retail industry are an ongoing concern. There are a number of factors that make retail systems attractive targets for hackers. Fortunately, there are also effective safeguards against these attacks. In an industry that has traditionally only...
Security risk assessments are an important tool in your organization's arsenal against cyber threats. Because they highlight areas of risk in your digital ecosystem. As well as informing and prioritizing mitigation strategies, and ensuring that hard-earned resources...
We will participate in the most recent Gartner Identity & Access Management Summit . Year after year, identity is the most commonly exploited attack vector used by adversaries in cyberspace. On the enterprise side, compromised identities have been used to steal...