Third-Party Risk for Organizations The European NIS 2 Directive, the legal framework on cybersecurity for the Member States, introduces in the cybersecurity strategy required of organizations...
Risks
Cyber Policies: The Challenge of Assessing Risk
The high risk associated with a cyber policy gives the insurance company’s CISO a leading role in designing the risk assessment strategy and calculating the cyber policy.
How can your credit card details be stolen?
Cybercriminals obtain credit card data during offline transactions through a variety of techniques including social engineering
Phishing: What Is It and How Many Types Are There
Phishing is a set of techniques that aim to deceive a victim and gain their confidence by impersonating a trusted person, company or service.