Organizational Cyber Security in times of Global Crisis: The AI Factor
Blog posts

Organizational Cyber Security in times of Global Crisis: The AI Factor

Apr 15, 2026 Read →
"Fire sale", it's a myth anyway. It can't be done – Live Free or Die Hard (2007)
Blog posts

"Fire sale", it's a myth anyway. It can't be done – Live Free or Die Hard (2007)

Jun 23, 2025 Read →
Indictment of Sudanese Nationals: Unveiling the Anonymous Sudan Cyberattacks on Critical Infrastructure
Blog posts

Indictment of Sudanese Nationals: Unveiling the Anonymous Sudan Cyberattacks on Critical Infrastructure

Oct 21, 2024 Read →
Cyber Threats in Maritime Ports: Safeguarding the Global Supply Chain from Emerging Risks
Blog posts

Cyber Threats in Maritime Ports: Safeguarding the Global Supply Chain from Emerging Risks

Sep 29, 2024 Read →
Rescana Announces Strategic Collaboration with Cybersecurity Leader Wiz and Aspiration Japan to Revolutionize Cloud Security in Japan
Blog posts

Rescana Announces Strategic Collaboration with Cybersecurity Leader Wiz and Aspiration Japan to Revolutionize Cloud Security in Japan

Aug 27, 2024 Read →
CTEM 101: Understanding Continuous Threat Exposure Management
Blog posts

CTEM 101: Understanding Continuous Threat Exposure Management

Aug 7, 2024 Read →
Embracing the Digital Supply Chain
Blog posts

Embracing the Digital Supply Chain

May 19, 2024 Read →
Type Your Password One More Time
Blog posts

Type Your Password One More Time

May 1, 2024 Read →
Digital Identity Safety
Blog posts

Digital Identity Safety

Apr 7, 2024 Read →
Third party risk management - you don't know what you don't know.
Blog posts

Third party risk management - you don't know what you don't know.

Dec 21, 2023 Read →
International Fraud Awareness Week
Blog posts

International Fraud Awareness Week

Nov 19, 2023 Read →
Navigating the New Norm: Business-Led IT in the Modern Enterprise
Blog posts

Navigating the New Norm: Business-Led IT in the Modern Enterprise

Nov 9, 2023 Read →
Vendor Risk Assessment - Connecting the Dots
Blog posts

Vendor Risk Assessment - Connecting the Dots

Nov 1, 2023 Read →
A Crucial Shield Against Sophisticated Cyber Threats
Blog posts

A Crucial Shield Against Sophisticated Cyber Threats

Oct 3, 2023 Read →
Unmasking Business Email Compromise: Understanding, Identification, and Prevention
Blog posts

Unmasking Business Email Compromise: Understanding, Identification, and Prevention

Jun 19, 2023 Read →
The Dark Side of ChatGPT and Implications for Supply Chain Security
Blog posts

The Dark Side of ChatGPT and Implications for Supply Chain Security

May 11, 2023 Read →
Together we stand
Blog posts

Together we stand

Apr 19, 2023 Read →
Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management
Blog posts

Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management

Mar 23, 2023 Read →
Suppliers Cybersecurity Ranking
Blog posts

Suppliers Cybersecurity Ranking

Feb 27, 2023 Read →
Remote Work and the Implications of Third-Party Risk Management
Blog posts

Remote Work and the Implications of Third-Party Risk Management

Feb 6, 2023 Read →
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Blog posts

Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors

Jan 16, 2023 Read →
Mapping Your Third-party Providers Based on These Simple Rules
Blog posts

Mapping Your Third-party Providers Based on These Simple Rules

Dec 22, 2022 Read →
DDOS is emerging as a state attack tool of choice, how should I prepare?
Blog posts

DDOS is emerging as a state attack tool of choice, how should I prepare?

Nov 21, 2022 Read →
Maritime Cyber Security - Will the CISO go down with his ship?
Blog posts

Maritime Cyber Security - Will the CISO go down with his ship?

Oct 11, 2022 Read →