Introducing Cyber Security Core: For Startups and SMEs
We're excited to announce the release of Cyber Security Core: Strategy & Operations for Business Owners and SMEs! Discover tailor-made Cybersecurity Solutions.
Announcing our ISO 27001:2022 Gap Analysis Tool!
Berlin Cyber Security Social #5 - ISO 27001
Podcast: Business Value of Information and Cybersecurity
Recently, Hannah Suarez and Elizabeth Press of D3M Labs discussed the topic on growing business value with cybersecurity. They discuss supply chain security, data sovereignty, the role of cybersecurity in business and more.
Startups and Maintaining the Security of Supply Chain
Conversation Preview: Startups Being Execution-Focused vs Maintaining the Security of Supply Chain #informationsecurity #cybersecurity #innovation
Berlin Cybersecurity Social
Join us for the Berlin Cybersecurity Social meetup! Don't miss this opportunity to connect with like-minded cybersecurity professionals. For event details, read the latest news on the blog.
The Modern CISO Network: Board Book
Explore the second edition of the Modern CISO Network: Board Book Directory, blocked by Lacework. A network of CISOs and cybersecurity professionals ready for your business needs - read more for some exciting news!
Superuser OÜ at BSides Berlin
Speaker Announcement: We are pleased to announce Hannah Suarez, Chief Information Security Officer will be a keynote speaker at BSides Berlin. Join us on November 18!
Airlines: A High Threat For Data Breaches
From the Air Europa Data Breach incident, Cyber Security breaches are more than just setbacks for operational disruption. Leaders should prioritise Cyber Threats on key areas: IT Security, heightened regulatory scrutiny and safeguarding personal data.
Loyalty Programs: A Gold Field for Hackers
The Cybersecurity breach targeting the 'Caesar's Rewards' Loyalty Program Database acts as a stark reminder to the entire Information Security and Data Protection industry, an enticing target for hackers.
Highlights from 44CON: London 2023
Highlights from 44CON: From Physical Security, Cloud Security, MITRE ATT&CK, and the SaaS Cyber Kill-Chain. Read more on our highlights of the cyber security event!
Cyber Risk Management and Attack Trees
Stay one step ahead in Risk Management with Attack Trees! Discover how Cyber Security tools understand, record and manage Risk Registers to fortify your Cyber Risk strategy.