
NIS2 Architecture Security: An Interactive Guide
In this section you can find a large selection of high-quality research papers, intelligence reports and whitepapers. Use the opportunity to learn about new threats and technologies, get updated on best practices and find actionable advice.
Whilst commonly referred to as Ransomware, we define “Cyber Extortion” (Cy-X) as a form of computer crime in which the security of a digital asset (Confidentiality, Integrity, or Availability) is compromised and exploited in a threat of some form to extort payment.
Download the Cy-Xplorer report to learn more.
Your primary source of first-hand information on Cyber Defense, 2024 edition. 180 pages of first-hand information, statistics and expert analysis to get an overview of what is going on in cyber.
To help you extract the key findings that are relevant for you, we present this Executive Navigator 2024. It delivers insights for strategic decision-making, based on research findings, for non-executive board members, CEOs, CFOs and CIOs.
NIS2 Architecture Security: An Interactive Guide
Security Navigator for Business Leaders
Security Navigator 2024
E-Book: Intelligence-led Managed Security Services
Why you can't view OT security through an IT lens
A CISO’s guide to effective leadership
Never pass on password security
Whitepaper: Securing your remote workers
Beating ransomware
2019 Security Maturity Report