top of page


DDOS is emerging as a state attack tool of choice, how should I prepare?
Cybercrime is about as old as the Internet on which it happens, and DDoS attacks are one of the oldest attack vectors that are still...
Nov 21, 20225 min read


Maritime Cyber Security - Will the CISO go down with his ship?
As technology has transformed the global economy, cyber security risks have increased. The maritime industry has felt the effects of the...
Oct 11, 202214 min read


Open-Source Intelligence – an invaluable tool for Mergers and Acquisitions
If your company is exploring the acquisition of another company, you must conduct rigorous due diligence to evaluate whether the target...
Sep 18, 20228 min read


Growing fines to change the face of Third Party Risk Management?
In the past couple of years, cybersecurity has been the #1 priority for plenty of companies, in lieu of skyrocketing cybercrime rates....
Aug 28, 20226 min read


Challenges in Open-Source Intelligence: Managing Uncertainty and Information Quality
These days, the demand for OSINT (Open-Source Intelligence) services is higher than ever. By some estimates, the OSINT market will reach...
Jul 24, 202214 min read


How a Cyberattack Could Effect Your Company's Bottom Line
According to every relevant study and industry source — cybercrime has been on a meteoric rise in the past couple of years. Throughout...
Jul 19, 202214 min read


Think twice before you post that picture – check out SOCMINT (social media OSINT).
These days, we share more of our personal information online than ever before — in most cases, without even realizing it. In fact,...
May 30, 20225 min read


OSINT - the go-to tool for cryptocurrency forensics
While cryptocurrencies have theoretically been aimed at democratizing the global financial system, they’ve also ushered in a wave of...
May 20, 20224 min read


Horizontal and Vertical Domain enumeration
When performing any security assessment, domain names are a vital element of the reconnaissance phase – mapping the attack surface...
May 9, 20223 min read


The AI-bots are coming (to OSINT)
AI has had a deep impact on OSINT investigations, by way of increasing scale, efficiency and accuracy.
May 3, 20224 min read


The Olympic cyber games
As we transition to an increasingly digital world, every aspect of our lives is becoming augmented with digital technology. In most...
Feb 11, 20223 min read


Log4Shell - what we know and how can you protect yourself.
On December 9th, Alibaba Cloud Security team's Chen Zhaojun reported a critical vulnerability (called "Log4Shell", designated -...
Dec 13, 20214 min read


Why must Cyber Security and Digital Transformation programs go hand in hand?
The COVID-19 pandemic has upended plenty of societal, cultural, and business norms that we’ve previously grown accustomed to. And one of...
Jun 3, 20217 min read


Enterprise Security - it's a Marathon, Not a Sprint.
Tacitus, one of the greatest historians and scholars of Ancient Rome, claimed that “the desire for safety stands against every great...
Jun 1, 20217 min read


Building Customer Cyber Security Trust - One step at a time
Whether it’s for business or personal use, the internet has embedded itself in every part of our modern lives. Customers and online...
May 6, 20217 min read


Managing Cyber Security Programs - How to Effectively Communicate Success
When it comes down to it, it’s up to your business or organization’s leadership and directors to take responsibility for the business’s...
May 3, 20216 min read


The Importance of Information Assurance and Cybersecurity in a Changing World
Data has become the most valuable new commodity in the information age. As users on the internet, we’re constantly exchanging data with...
Apr 26, 20218 min read


Third Party Risk Assessment Fatigue - Why should you care?
Mutual efficiency is key to your third party risk program's success - learn more about the problem and how to mitigate it's effects
Apr 15, 20216 min read


Supply Chain Security in the Shadow of Centreon and Solarigate
In light of the recent Solarigate and Centreon cyber-attacks, you may be wondering how to protect yourself from such attacks. This...
Feb 18, 20215 min read
SolarWinds Attack Report
A summary and recommendations for mitigation of the recent SolarWinds Global Cyber Security Incident. Executive Summary: While...
Dec 16, 20202 min read
bottom of page