top of page
Stay Ahead: Insights and Strategies in Cybersecurity


Oh it's phishing, credential abuse and misconfigurations again!
Phishing, credential abuse and misconfigurations are the most prevalent attack methods. Gain some helpful insight in how you can protect your organisation!
Jun 172 min read


AI Powered SOCs - Noise, Metrics, Trust
AI Powered SOC evaluation. Learn about key metrics measured, upcoming evaluations.
May 192 min read


Beyond Certification: The Role of Evaluations in Real-World Cybersecurity Testing
Learn about certifications and evaluations. Why they should be treated differently and what they should be used for.
May 162 min read
bottom of page