top of page
Nov 21, 20225 min read
DDOS is emerging as a state attack tool of choice, how should I prepare?
Cybercrime is about as old as the Internet on which it happens, and DDoS attacks are one of the oldest attack vectors that are still...
Oct 11, 202214 min read
Maritime Cyber Security - Will the CISO go down with his ship?
As technology has transformed the global economy, cyber security risks have increased. The maritime industry has felt the effects of the...
Sep 18, 20228 min read
Open-Source Intelligence – an invaluable tool for Mergers and Acquisitions
If your company is exploring the acquisition of another company, you must conduct rigorous due diligence to evaluate whether the target...
Aug 28, 20226 min read
Growing fines to change the face of Third Party Risk Management?
In the past couple of years, cybersecurity has been the #1 priority for plenty of companies, in lieu of skyrocketing cybercrime rates....
Jul 24, 202214 min read
Challenges in Open-Source Intelligence: Managing Uncertainty and Information Quality
These days, the demand for OSINT (Open-Source Intelligence) services is higher than ever. By some estimates, the OSINT market will reach...
Jul 19, 202214 min read
How a Cyberattack Could Effect Your Company's Bottom Line
According to every relevant study and industry source — cybercrime has been on a meteoric rise in the past couple of years. Throughout...
May 30, 20225 min read
Think twice before you post that picture – check out SOCMINT (social media OSINT).
These days, we share more of our personal information online than ever before — in most cases, without even realizing it. In fact,...
May 20, 20224 min read
OSINT - the go-to tool for cryptocurrency forensics
While cryptocurrencies have theoretically been aimed at democratizing the global financial system, they’ve also ushered in a wave of...
May 9, 20223 min read
Horizontal and Vertical Domain enumeration
When performing any security assessment, domain names are a vital element of the reconnaissance phase – mapping the attack surface...
May 3, 20224 min read
The AI-bots are coming (to OSINT)
AI has had a deep impact on OSINT investigations, by way of increasing scale, efficiency and accuracy.
Feb 11, 20223 min read
The Olympic cyber games
As we transition to an increasingly digital world, every aspect of our lives is becoming augmented with digital technology. In most...
Dec 13, 20214 min read
Log4Shell - what we know and how can you protect yourself.
On December 9th, Alibaba Cloud Security team's Chen Zhaojun reported a critical vulnerability (called "Log4Shell", designated -...
Jun 3, 20217 min read
Why must Cyber Security and Digital Transformation programs go hand in hand?
The COVID-19 pandemic has upended plenty of societal, cultural, and business norms that we’ve previously grown accustomed to. And one of...
Jun 1, 20217 min read
Enterprise Security - it's a Marathon, Not a Sprint.
Tacitus, one of the greatest historians and scholars of Ancient Rome, claimed that “the desire for safety stands against every great...
May 6, 20217 min read
Building Customer Cyber Security Trust - One step at a time
Whether it’s for business or personal use, the internet has embedded itself in every part of our modern lives. Customers and online...
May 3, 20216 min read
Managing Cyber Security Programs - How to Effectively Communicate Success
When it comes down to it, it’s up to your business or organization’s leadership and directors to take responsibility for the business’s...
Apr 26, 20218 min read
The Importance of Information Assurance and Cybersecurity in a Changing World
Data has become the most valuable new commodity in the information age. As users on the internet, we’re constantly exchanging data with...
Apr 15, 20216 min read
Third Party Risk Assessment Fatigue - Why should you care?
Mutual efficiency is key to your third party risk program's success - learn more about the problem and how to mitigate it's effects
Feb 18, 20215 min read
Supply Chain Security in the Shadow of Centreon and Solarigate
In light of the recent Solarigate and Centreon cyber-attacks, you may be wondering how to protect yourself from such attacks. This...
Dec 16, 20202 min read
SolarWinds Attack Report
A summary and recommendations for mitigation of the recent SolarWinds Global Cyber Security Incident. Executive Summary: While...
bottom of page