Suppliers Cybersecurity Ranking
Blog posts

Suppliers Cybersecurity Ranking

Feb 27, 2023 Read →
Remote Work and the Implications of Third-Party Risk Management
Blog posts

Remote Work and the Implications of Third-Party Risk Management

Feb 6, 2023 Read →
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Blog posts

Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors

Jan 16, 2023 Read →
Mapping Your Third-party Providers Based on These Simple Rules
Blog posts

Mapping Your Third-party Providers Based on These Simple Rules

Dec 22, 2022 Read →
DDOS is emerging as a state attack tool of choice, how should I prepare?
Blog posts

DDOS is emerging as a state attack tool of choice, how should I prepare?

Nov 21, 2022 Read →
Maritime Cyber Security - Will the CISO go down with his ship?
Blog posts

Maritime Cyber Security - Will the CISO go down with his ship?

Oct 11, 2022 Read →
Open-Source Intelligence – an invaluable tool for Mergers and Acquisitions
Blog posts

Open-Source Intelligence – an invaluable tool for Mergers and Acquisitions

Sep 18, 2022 Read →
Growing fines to change the face of Third Party Risk Management?
Blog posts

Growing fines to change the face of Third Party Risk Management?

Aug 28, 2022 Read →
Challenges in Open-Source Intelligence: Managing Uncertainty and Information Quality
Blog posts

Challenges in Open-Source Intelligence: Managing Uncertainty and Information Quality

Jul 24, 2022 Read →
How a Cyberattack Could Effect Your Company's Bottom Line
Blog posts

How a Cyberattack Could Effect Your Company's Bottom Line

Jul 19, 2022 Read →
Think twice before you post that picture – check out SOCMINT (social media OSINT).
Blog posts

Think twice before you post that picture – check out SOCMINT (social media OSINT).

May 30, 2022 Read →
OSINT - the go-to tool for cryptocurrency forensics
Blog posts

OSINT - the go-to tool for cryptocurrency forensics

May 20, 2022 Read →
Horizontal and Vertical Domain enumeration
Blog posts

Horizontal and Vertical Domain enumeration

May 9, 2022 Read →
The AI-bots are coming (to OSINT)
Blog posts

The AI-bots are coming (to OSINT)

May 3, 2022 Read →
The Olympic cyber games
Blog posts

The Olympic cyber games

Feb 11, 2022 Read →
Log4Shell - what we know and how can you protect yourself.
Blog posts

Log4Shell - what we know and how can you protect yourself.

Dec 13, 2021 Read →
Why must Cyber Security and Digital Transformation programs go hand in hand?
Blog posts

Why must Cyber Security and Digital Transformation programs go hand in hand?

Jun 3, 2021 Read →
Enterprise Security - it's a Marathon, Not a Sprint.
Blog posts

Enterprise Security - it's a Marathon, Not a Sprint.

Jun 1, 2021 Read →
Building Customer Cyber Security Trust - One step at a time
Blog posts

Building Customer Cyber Security Trust - One step at a time

May 6, 2021 Read →
Managing Cyber Security Programs - How to Effectively Communicate Success
Blog posts

Managing Cyber Security Programs - How to Effectively Communicate Success

May 3, 2021 Read →
The Importance of Information Assurance and Cybersecurity in a Changing World
Blog posts

The Importance of Information Assurance and Cybersecurity in a Changing World

Apr 26, 2021 Read →
Third Party Risk Assessment Fatigue - Why should you care?
Blog posts

Third Party Risk Assessment Fatigue - Why should you care?

Apr 15, 2021 Read →
Supply Chain Security in the Shadow of Centreon and Solarigate
Blog posts

Supply Chain Security in the Shadow of Centreon and Solarigate

Feb 18, 2021 Read →
SolarWinds Attack Report
Blog posts

SolarWinds Attack Report

Dec 16, 2020 Read →