
From SambaSpy to Sorillus: Dancing through a multi-language phishing campaign in Europe
16 June 2025
From SambaSpy to Sorillus: Dancing through a multi-language phishing campaign in Europe
16 June 2025
Welcome to the post-quantum era: challenges and strategies for cybersecurity
11 June 2025
NIS2 Architecture Security: An Interactive Guide
Aviation industry: OT cartography and detection
Automotive: Gain a complete visibility on security posture of critical cloud assets
Invensys
Staffordshire County Council
Ikazia Hospital
Intelligent network protection brings EDAG up to speed after being hit by Ransomware
Orange Cyberdefense Achieves Palo Alto Networks Cortex eXtended Managed Detection and Response (XMDR) Select Specialization in APAC
7 May 2025
The Future of Vulnerability Management: Why digital sovereignty is now a cybersecurity imperative?
6 May 2025
NIS2 in Practice – How We Support Your Cybersecurity – From Analysis and Strategy to Ongoing Security Operations
30 April 2025
NIS2 i praksis – sådan understøtter vi din cybersikkerhed – Fra analyse og strategi til kontinuerlig sikkerhedsdrift
30 April 2025
Sådan understøtter vi jeres Microsoft-investeringer og sikrer NIS2-compliance
How we support your Microsoft investments and ensure NIS compliance
Styrk din cybersikkerhedsstrategi – så er du godt forberedt, når NIS2 træder i kraft
Vigtige OT-sikkerhedsindsatsområder, som sikrer NIS2-compliance
NIS2 Requirements and OT Security
Vulnerabilities on customer devices: a never-ending story
22 April 2025
Buffering business security in China’s sovereign digital landscape
15 April 2025
Part 4 - Forging forward with GenAI
14 April 2025
Part 3 - Forging forward with GenAI
2 April 2025