In this blog, we go over the recent enlightening Risk Match webinar to discuss the ever-evolving landscape of AI security.
Join our webinar on the Cyber Resilience Act for a deep dive into the context, implications, and the right proactive measures
In this edition we talk about 5 Challenges of Rolling Out Threat Modeling within an Enterprise-Sized Company and curated content taking a deep dive into…
We’re excited to announce the second edition of our Cybersecurity Café, an evening filled with cybersecurity insights!
In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In this edition we show you why Threat Models are useless, but threat modeling is essential, along with other interesting threat modeling facts!
In the ever-changing landscape of cybersecurity, the Cybersecurity Regulatory Act (CRA) stands as a pivotal development. This edition is dedicated to unraveling the CRA’s impact,…
Day in the Life: Thomas Heyman Step into the shoes of Thomas Heyman, a dedicated cybersecurity consultant, as we explore a typical day in his…
A CISO is the last line of defence to protect your assets. What’s the CISO’s role? And what makes a good CISO?
Tech companies go through 3 stages. Which cybersecurity issues do they face at each stage? We cover it all on this edition of The Wide…