Marketing Director
The paramount importance of Third-Party Risk Management in cybersecurity
The more business partners an extended enterprise has, the greater the need is to think about third-party cybersecurity risk management.
Lydie Aubert
Understanding malware and mitigating cyber risk
Learn all you need to know about malicious software to perfect your cyber security.
How to create a cyber security risk map?
What is risk mapping? What methods should you follow to make it useful? Whom should you involve in the process? How can you adapt it to cyber risks?
Cyber attacks: how to identify them and protect yourself effectively?
Cyberattacks are malicious attempts to harm a defined target. Find out how to protect your business against cybercrime in 2022.
Is HAZOP applicable to cybersecurity?
The HAZOP method applies to the analysis of cyber risks of the industrial company. A guide to advantages, disadvantages and approaches applied to IT.