Sep 186 minDORA Compliance and your Threat & Vulnerability Management Programme. Part 2: Tips to get ready
Sep 134 minDORA Compliance and your Threat & Vulnerability Management (TVM) Programme. What you need to know
Jul 223 minAnnouncing Our ISO27001:2022 Certification: A Milestone in Our Commitment to Security and Compliance
Nov 30, 20233 minCytidel raises €1.35 million to transform how organisations protect themselves from cyber attacks
Jul 19, 20235 minKnock Knock, Who's There? Zero-day CVE-2023-3519... A Guide to Securing Your Citrix Gateway
Jun 9, 20234 minUrgent Alert: Critical Vulnerability in MOVEit Transfer Puts Your Data at Risk - CVE-2023-34362
May 30, 20234 min8 benefits organisations can get from adopting a risk-based vulnerability management (RBVM)
May 30, 20234 minBeware of the Barracuda: The Latest Email Security Threat You Can't Ignore - CVE-2023-2868
May 10, 20232 minDon't Let ESXiArgs Take a Byte Out of Your Business: Protecting Your VMware ESXi Servers
May 3, 20232 minSLP's Achilles Heel: Protect Your Network from DDoS Vulnerabilities – CVE-2023-29552
Apr 28, 20232 minVeeam Backup Plan Gone Wrong: The Uninvited Guest at Your Data Breach Party - CVE-2023-27532
Apr 25, 20232 minBeware of Malicious Word Documents: New Vulnerability Discovered in Microsoft Office: CVE-2023-21716