
No spam, only Cyber Insights 1x a month !
"*" indicates required fields

It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…
Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…
Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…
What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…
When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…
In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…
Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…
Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…
The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…
To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…
The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…
How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…