Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

DORA Is Here – But Readiness Concerns Are Far from Over 

For months, the impending Digital Operational Resilience Act (DORA) deadline has dominated boardroom discussions across the financial sector with its potential to reshape operational and regulatory practices. Now that DORA is officially in effect, attention has shifted to other matters, such as a new US presidential inauguration, AI, and fiscal concerns for 2025. Yet DORA […]

Guess Who’s Hiding in Your Supply Chain 

Hackers don’t always come knocking at the front door. Many organisations are unwittingly leaving a virtual welcome mat with a key beneath it at access points across their supply chain. A lack of visibility in an organisation’s supply chain can leave vulnerable entry points exposed for bad actors and open an organisation up to unnecessary […]

Cybersecurity: The “What”, the “How” and the “Who” of Change

The time has come for top leaders to own the problem back and address it as they would any other business challenge Cybersecurity budgets appear to be on the rise, driven by increasing regulatory pressure and relentless threats. In fact, there is still a dominant line of thought in the industry pointing towards chronic underinvestment as being the […]

Cybersecurity in retail: What does the future hold?

With the retail industry evolving at a rapid rate, technological innovation has played a critical role in offering a competitive advantage to retailers. However, while technology brings immense benefits, it also introduces vulnerabilities that need to be addressed. Technologies such as Gen AI are helping to transform the industry by combating common customer pain points […]

Geopolitical crises bring state and commercial hackers together

Nation state cyber spies from Iran and North Korea are increasingly cooperating with commercial ransomware gangs to cause damage in Western corporate networks. Impacting organisations, and therefore, the economy in the West serves the aims of these countries. The lines between nation state and financial motivation are blurring, including their skills and equipment. The research […]

The CISO, the CSO and the Future of the Cybersecurity Organization

For many firms, it is a cultural transformation that is required, not just the implementation of some new tools. Recent surveys continue to paint the picture of a fairly unhappy CISO community, hopping from job to job, trapped in failed and endless bottom-up games with senior executives in their attempts to justify their views of what needs to be […]

Cyber Fusion: a next generation approach to NIS2 compliance

The NIS2 Directive, which came into force in October, imposes extensive cyber risk management, incident reporting, business continuity, and information sharing obligations on a much greater number of organisations – around 30,000 compared to the 3,000 previously affected by NIS1. The directive also introduces significantly higher penalties and sanctions for organisations that fail to comply […]

Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) […]