Skip to main content

Blog

Discover our cybersecurity articles
PCI security standard

Joint PCI security and CSA guidance on scoping cloud environments

24.Aug.2021

Read More
published 1M credit cards

Insights about All World Cards and the published 1M credit cards

12.Aug.2021

Read More
Attack Surface for Insurance Applications cover

Mapping the Attack Surface for Insurance Applications

02.Aug.2021

Read More
Initial Access Brokers

Use of Initial Access Brokers by Ransomware Groups

28.Jun.2021

Read More
zero trust architecture

Zero Trust Architecture (ZTA) within LEXIS

23.Jun.2021

Read More
webinar ITV ciso conversation

ITV #CISO on building a security culture and managing risk

02.Jun.2021

Read More
CIS version 8

What’s new and changed in CIS CSC version 8 – IG1

21.May.2021

Read More
what is API security

What is API Security and how to protect them

20.May.2021

Read More
most critical vulnerabilities

The most critical vulnerabilities right now

12.May.2021

Read More
An In-Depth analysis of the new Taurus Stealer

An In-Depth analysis of the new Taurus Stealer

07.May.2021

Read More

Looking for anything in particular?

Type your search word here