As the pandemic unfolds and countries worldwide go to great lengths in handling the crisis we witness a new evil rising. Secluded in the shadow of the biological hazard follows a wave of digital ones.
Societies worldwide face the challenge of lockdowns and, as a logical consequence, switch a lot of their social and working lives to digital. This opens a lot of opportunities, both for good and bad.
At this point we as a society depend on digital more than ever before. To minimize the spread of COVID-19, people all over the world turn to the web for support. We work from our home office. Artists perform live via streams for our entertainment. We keep in contact with our loved ones, even if we cannot meet in person. We gather the latest news and information online to stay up to date.
But with this, the dark side of the web closes in on us as well: fraudsters, acting as health ministry or WHO officials, extracting personal information or money for fake-tests, criminals spreading fake-news and malware hidden in virus heatmaps or tracking apps, or even attacking healthcare organizations, putting human lives at risk.
[Webcast] COVID-19 – Implications for cybersecurity
[Webcast] COVID-19 – Implications for cybersecurity
14th of Apr[Webcast] Cybersecurity in a lockdown – Does the new context favour the attacker or the defender?
[Webcast] Cybersecurity in a lockdown – Does the new context favour the attacker or the defender?
16th of Jun[Webcast] How the shift to home-working impacted the challenge of vulnerability management
[Webcast] How the shift to home-working impacted the challenge of vulnerability management
23rd of JulHacking a factory: A safe way to testing ICS/OT environments
23 April 2024
The power of GRC: How governance, risk and compliance (GRC) can shape the backbone of your security strategy
23 April 2024
CERT alert: Threat Level 5/5 - CVE-2024-3400: critical 0day in Palo Alto's GlobalProtect gateway exploited in the wild
17 April 2024
These 7 common mistakes make OT environments vulnerable
10 April 2024
Managed Detection and Response: Finding the right balance for your business
10 April 2024
OT Security
Application Security
Network Security
Security Operations
Threat and Risk Management