A Crucial Shield Against Sophisticated Cyber Threats
- Jun 20, 2023
- 5 min
Unmasking Business Email Compromise: Understanding, Identification, and Prevention
- May 11, 2023
- 3 min
The Dark Side of ChatGPT and Implications for Supply Chain Security
- Apr 19, 2023
- 3 min
Together we stand
- Mar 23, 2023
- 3 min
Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management
- Feb 27, 2023
- 1 min
Suppliers Cybersecurity Ranking
- Feb 6, 2023
- 7 min
Remote Work and the Implications of Third-Party Risk Management
- Jan 16, 2023
- 4 min
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
- Dec 22, 2022
- 6 min
Mapping Your Third-party Providers Based on These Simple Rules
- Nov 21, 2022
- 5 min
DDOS is emerging as a state attack tool of choice, how should I prepare?
- Oct 11, 2022
- 14 min
Maritime Cyber Security - Will the CISO go down with his ship?
- Sep 18, 2022
- 8 min
Open-Source Intelligence – an invaluable tool for Mergers and Acquisitions
- Aug 28, 2022
- 6 min
Growing fines to change the face of Third Party Risk Management?
- Jul 24, 2022
- 14 min
Challenges in Open-Source Intelligence: Managing Uncertainty and Information Quality
- Jul 19, 2022
- 14 min
How a Cyberattack Could Effect Your Company's Bottom Line
- May 30, 2022
- 5 min
Think twice before you post that picture – check out SOCMINT (social media OSINT).
- May 20, 2022
- 4 min
OSINT - the go-to tool for cryptocurrency forensics
- May 9, 2022
- 3 min
Horizontal and Vertical Domain enumeration
- May 3, 2022
- 4 min
The AI-bots are coming (to OSINT)
- Feb 11, 2022
- 3 min
The Olympic cyber games