Why Phishing is Still a Thing – and How You Can Identify It
Are you able to identify a good phishing mail? Take a look at the anatomy of a phishing e-mail in our infographic!
Read moreAre you able to identify a good phishing mail? Take a look at the anatomy of a phishing e-mail in our infographic!
Read moreFrameworks make it easier to measure against a reference point. But which are the best frameworks for cybersecurity? Tom Madsen has the answer
Read moreThreat Intelligence is trending in cybersecurity. But it’s often limited to the infrastructure, business critical applications are often left out. Read here how SAP threat intelligence works.
Read moreThe use of collaboration platforms has spiked this year, helping to ease the effects of the Corona crisis. However, these platforms are a security threat themselve. Read why and what do about it in this article.
Read morePrivacy will become an ever more important topic in the future. This is also reflected in some new certifications available – read the details in this article.
Read moreDiversity in Cybersecurity is a topic which, very often, seems to be neglected. Which is why we’re especially thrilled to have had the chance to interview Vandana Verma, whose initiative Infosec Girls aims to promote women in their careers in cybersecurity.
Read moreSecure development is of utmost importance. for cybersecurity. Our author Tom Madsen further explores this topic in this article.
Read moreThe National Coding Week starting today in the UK aims to highlight the importance of digital skills for our future. Read about the role of coding for the future of cybersecurity in our latest article.
Read moreA good identity and access management requires a good access governance strategy.
Read moreIn cybersecurity, the brutal reality is that security incidents happen every day, but the impact of most are negligible. The real challenge is spotting which events are most likely to inflict the most damage to the business. Read how in our latest article.
Read more