Information Security: 5 Best Practices to Implement in Your Company
19 February 2026CybersecurityCybersecurity,Kartos
In 2026, Data protection has become a critical priority in the business environment. Good…
Egosurfing and online reputation: how your digital presence affects your image
16 February 2026Organizations,Cybersecurity,Ciber surveillance,CybersecurityPersons
First impressions no longer happen only in person. Today, they happen on Google, on social media,…
Risks of AI in people's online safety
11 February 2026Risks,AI,Cybersecurity,QondarCybersecurity
The risks of AI are transforming the cybersecurity landscape at an unprecedented pace. While…
AI in cognitive warfare: how are cyberattacks evolving?
6 February 2026CybersecurityRisks,AI
When we talk about cyberattacks, we used to think almost exclusively of viruses, data theft, or…
The importance of maintaining security on mainframes and its impact on the business
2 February 2026Organizations,Cybersecurity,CybersecurityKartos
Mainframes have been at the heart of many large organizations: banks, insurance companies, public…
CTEM (Continuous Threat Exposure Management) as a prominent cybersecurity approach
30 January 2026CybersecurityCTEM,Cybersecurity,Kartos
Cybersecurity has been making it clear for years that simply "having protection" is no longer…
European Data Protection Day, a reminder for CISOs and security directors
28 January 2026data,Europe,CybersecurityCybersecurity
Each January 28th is European Data Protection Day. This date, beyond the symbolic gesture, invites…
The future of autonomous AI: challenges and opportunities in cybersecurity
21 January 2026CybersecurityCybersecurity,AI
Cybersecurity is inextricably linked to artificial intelligence today. In just a few years, AI has…
Typosquatting, a silent threat to your organization's digital reputation
14 January 2026Cybersecurityphishing,Cybersecurity,Kartos
A small typo in a URL might seem insignificant. However, behind this everyday action lies one of…










