Skip to content
21.9.2023

Active Directory: Introduction

Learn how to secure your Active Directory environment in this blog series! Explore common pitfalls, vulnerabilities, and of course mitigation strategies.
5.9.2023

Ensuring Digital Trust - the Three Lines of Defence

The Three Lines of Defence model provides a structured approach for organisations to ensure robust risk management while fostering digital trust.
30.8.2023

Security risks in text-based AI applications

Learn about the security risks in text-based AI applications. Explore the OWASP Top 10 for Large Language Model Applications.
29.8.2023

Strengthening Digital Trust: The Vital Role of Risk Management

In the digital realm trust is fundamental for business success. This blog explores how risk management plays a crucial role in establishing and maintaining digital trust.
3.7.2023

Building Digital Trust: Navigating Challenges and Paving the Way Forward

Explore the concept of digital trust in the rapidly evolving digital landscape. Learn about the challenges and ways to enhance trust.
3.7.2023

Ecommerce's Future: Headless Tech, AI, and Digital Transformation

Revolutionize e-commerce with digitalization, AI-powered operations, data-driven decisions, and cybersecurity. Stay ahead with headless and composable tech.
30.6.2023

How to ensure safe and compliant email communication

Email phishing accounts for over 90% of cyber attacks, and with the implementation of privacy regulations secure and compliant information exchange has become crucial.
23.3.2023

What is Amazon Security Lake?

Amazon Security Lake is a new security service by AWS. If you're looking for improved security management – this may be the game-changing service for you.
24.5.2022

VECS Conference 2022

In this blog post I share my key takeaways from the Cybersecurity & Connectivity track from the 2022 VECS conference.