Resources

Downloadables


Third Party Risk


Assessing and managing third party risk accurately and effectively for the duration of the business relationship is crucial to ensure the security and continuity of any organisation’s operations. In this paper we discuss the importance of third-party cyber risk assessment, common assessment methods, their shortcomings and the benefits of introducing the XTI approach to third-party risk assessment.

Download Third Party Irrigation Document

NIS 2 compliance


More than a decade ago, the European Union became aware of the need to develop a common legal framework on cyber security that would provide the basis for a shared strategy among Member States to fight cyber crime together.

Download NIS 2 Compliance Document

Extended Cybersecurity


The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.

Download the Extended Cybersecurity document

Cyber Threat Intelligence


Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.

Download Cyber Threat Intelligence Document

Phishing, Fraud and Scam campaigns in RRSS


In this paper we explore the major brand challenge posed by phishing, fraud and scam campaigns involving corporate identity theft on social media, the techniques used, the consequences for organisations, and advanced prevention and protection strategies against these ever-evolving cyberthreats.

Download document on Phishing, Fraud and Scam Campaigns in RRSS

Top 10 Network Vulnerabilities


The success of a cyberattack lies in the amount of information about the targeted organisation that cybercriminals have at their disposal, which makes it easier for them to prepare an attack that is very difficult to neutralise. In this document we analyse the ten most common corporate security vulnerabilities found in the network that are exploited by cybercriminals to plan their successful attack.

Download document Top 10 Network Vulnerabilities

Individual Cybersecurity for Relevant Individuals


In the digital environment, protecting information has become a critical priority for organisations. Corporate cybersecurity strategies are designed to secure the organisation’s data and systems and prevent security breaches that could lead to an attack that could put them at risk.

Download Individual Cybersecurity Document for Relevant Persons

Artificial Intelligence: The challenge for people's security


The emergence of artificial intelligence has revolutionised multiple sectors, offering significant benefits that no one doubts. However, as with every new technology, its development has also given rise to new threats and vulnerabilities.

Download Artificial Intelligence Paper: The Challenge for Human Security

Downloadables by sector
(Brouchers)

If you want to know how Digital Risk is a threat to the viability of the business that also affects all departments of the organisation and how it can be minimised thanks to XTI Cybersurveillance, we tell you about it in this document that we have written specifically for your sector.

Subscribe to our Newsletter

    The data included in this form will be included in a file owned by Enthec Solutions S.L. for the main purpose of managing your interest in the company's products and, where appropriate, for sending commercial communications from Enthec Solutions S.L.