Latest Regulatory and Compliance Trends and why that is critical
Regulatory approaches, such as NIS-2 and DORA in the EU, as well as a brief overview of relevant UK and US regulation. Which industries and... Read More
AI’s Achilles’ Heel: Unveiling Vulnerabilities in Artificial Intelligence
How can subtle manipulation of training data introduce hidden vulnerabilities allowing attackers to control AI behavior? How can inputs be crafted to exploit AI weaknesses... Read More
Nis 2.0 Easy to Install in 2 Months
Low cost solution. No Power Point. Real Life Story.
AI’s Double-Edged Sword in Cybersecurity: Empowering Attackers and Defenders Alike
The dual impact of AI in cybersecurity. How democratized AI tools are transforming the skillsets of both attackers and defenders. Insights into the evolving AI... Read More
Geopolitics in cybersecurity – Safeguarding national sovereignty in the digital era
Understanding national sovereignty in cyberspace. Global threat landscape and geopolitical tensions. Strategies for strengthening sovereign cybersecurity systems. International cooperation vs. sovereign control.
The impact of AI-driven attack vectors
How Cybercriminals use AI Tools for crafting attacks. Deepfakes. New Attack vectors.
Why a cloud native SIEM solution?
A SIEM primer Siem Solutions Explained, Siem Vendor Landscape Analysed Why a Cloud Native SIEM Makes Life Easier
Defence-In-Depth – Developing a Multi-Layered Defence-In-Depth Approach to Cyber-Physical Security of Substations
Defining defence-in-depth in the context of cyber-physical security for the digital substation. Developing effective risk mitigation strategies to support cyber-physical security of next generation substation... Read More
Security Breach – Learning from Critical Errors
Why the worst-case scenario must be tested. What we have learned about vulnerability – and what other companies can learn from it. How the learnings... Read More