top of page


Dec 21, 20236 min read
Third party risk management - you don't know what you don't know.
Cyber attacks are never one and the same - criminals constantly leverage new strategies in their efforts to exploit digital...


Nov 9, 20233 min read
Navigating the New Norm: Business-Led IT in the Modern Enterprise
In the dynamic landscape of enterprise technology, the emergence of business-led IT initiatives is a testament to the need for...


Nov 1, 20236 min read
Vendor Risk Assessment - Connecting the Dots
A new dimension of cybersecurity - correlating between business needs, cybersecurity tools, third-party vendors, and potential risks....


Oct 3, 20236 min read
A Crucial Shield Against Sophisticated Cyber Threats
The business ecosystems are a complex web of intricate digital interconnection. This complexity holds excellent opportunities but also...


Jun 19, 20235 min read
Unmasking Business Email Compromise: Understanding, Identification, and Prevention
BEC. One of the most insidious threats in the modern digital landscape, causing billions of dollars losses worldwide.


May 11, 20233 min read
The Dark Side of ChatGPT and Implications for Supply Chain Security
Introduction: While AI-powered language models like ChatGPT have revolutionized various applications, they also inadvertently empower...


Apr 19, 20233 min read
Together we stand
Introduction: In an increasingly interconnected business landscape, organizations rely on a multitude of third-party vendors and partners...


Mar 23, 20233 min read
Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management
Integrating a layer of Machine Learning algorithms into SOAR platforms can boost its ability to manage risks associated with third-party.


Feb 6, 20237 min read
Remote Work and the Implications of Third-Party Risk Management
Remote Work and its Implications


Jan 16, 20234 min read
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Yearly assessments of vendor security practices can help an organization identify potential security gaps and vulnerabilities in its network


Dec 22, 20226 min read
Mapping Your Third-party Providers Based on These Simple Rules
Without a reliable third-party risk management plan, it would be impossible for you
to add vendors to your supply chain without exposing you


May 3, 20224 min read
The AI-bots are coming (to OSINT)
AI has had a deep impact on OSINT investigations, by way of increasing scale, efficiency and accuracy.
bottom of page