Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Geopolitical crises bring state and commercial hackers together

Nation state cyber spies from Iran and North Korea are increasingly cooperating with commercial ransomware gangs to cause damage in Western corporate networks. Impacting organisations, and therefore, the economy in the West serves the aims of these countries. The lines between nation state and financial motivation are blurring, including their skills and equipment. The research […]

The CISO, the CSO and the Future of the Cybersecurity Organization

For many firms, it is a cultural transformation that is required, not just the implementation of some new tools. Recent surveys continue to paint the picture of a fairly unhappy CISO community, hopping from job to job, trapped in failed and endless bottom-up games with senior executives in their attempts to justify their views of what needs to be […]

Cyber Fusion: a next generation approach to NIS2 compliance

The NIS2 Directive, which came into force in October, imposes extensive cyber risk management, incident reporting, business continuity, and information sharing obligations on a much greater number of organisations – around 30,000 compared to the 3,000 previously affected by NIS1. The directive also introduces significantly higher penalties and sanctions for organisations that fail to comply […]

Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility

Cyber Rhino Threat Week (which took place from 9th to 13th December 2024) aims to inform, sharing threat intelligence insights and best practices with our customers, partners and industry ecosystem. This keynote session certainly set the stage for the week, exploring the complexities that organisations must consider when establishing and operating an effective Cyber Threat Intelligence (CTI) […]

15 Questions to Ask About Your API Posture 

I have a secret I’m going to share with you today. In the half dozen chief information security officer (CISO) roles I’ve held over the last 20 years, only one recruited me due to a breach. One.   The other five were either due to attrition, or the incumbent was replaced due to a loss of […]

State of Application Strategy 2024: Navigating hybrid IT trends

In the enterprise landscape, the term “hybrid” aptly describes application portfolios that encompass both modern (mobile, microservices) and traditional (client-server, monoliths, three-tier web) application types. Similar to terms like “cloud” and “edge”, “hybrid” signifies a composition of two different components, with “heterogeneous” serving as a near-synonym. This concept extends beyond application portfolios to include enterprise […]

Data Breach Costs Hit Record Highs: How to Protect Your Business in 2025

If 2024 taught us anything, it’s that breaches are no longer knocking on the door—they’re breaking in. IBM’s 2024 Cost of a Data Breach Report highlights how breaches are more frequent, expensive, and complex than ever. So, what can we learn from the latest report, and how can your organization turn these insights into actionable […]

What Ever Happened with Cybersecurity Strategic Thinking?

Businesses need to break out of the tactical mindsets that have dominated the past few years while their damage can still be reversed Since the advent of the Covid pandemic in 2020, cybersecurity practices, like business at large, have been struggling with strong short-termist and tactical headwinds: Not to mention: Little in the above was […]

Your Business Still Needs To Be Upfront About Data Protection

As data protection laws continue to evolve across the world, so too does the public’s awareness of privacy rights. When the GDPR was implemented back in 2018, it ushered in a new era of understanding; one that still shapes consumer expectations to this day. Strong policies and practices for data protection have become a necessary […]

Navigating DORA: Key Considerations for the Financial Sector

It is no secret that the financial industry is a serious target for cyber criminals, driving the need for more stringent regulations to help protect these institutions and their employee and customer data. Recent research undertaken by Security Scorecard indicates that in 2023, 78% of European financial institutions experienced a data breach involving a third party. Also, […]