<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
German website
search
close

EXCHANGE CVES: THE RESPONSE PLAN GAP

It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.

Read editorial

Supply Chain Attacks

Eward shares his personal insights on the 3 types of supply chains, the potential threats of each one to your organisation, and how to minimise these risks. 

Read editorial

On-Demand webinar | CEO chat: reflections & predictions

The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021. 

Watch on-demand

Patrolling the seas for cyber-pirates, while the leak is in your boat

We can be so preoccupied looking for incoming threats and attacks, we forget to lock the back door - or don’t even know of the door’s existence. When the bigger picture of your attack surface is incomplete, how can you tell what is most at risk? What should you secure first?

Watch on-demand

MAPPING A COMPLEX DIGITAL FOOTPRINT at PostNL

Over the years, the organisation has grown through expansions, mergers and acquisitions, making its digital footprint rather complex. Gunther Cleijn, Cyber Security Officer explains how he and his team work to ensure the security and daily productivity of the organisation. 

Read more

Webinar: Ransomware Submarine

In this on-demand webinar, Intel471 and Cybersprint take you down into the depths of enterprise ransomware. What can you do to protect your organisation? 

Watch Webinar

IT Governance: OVERSEEING YOUR DIGITAL FOOTPRINT

Organisational reliance on IT is increasing and outsourcing of services grows. What individual components are necessary for successful IT governance strategy

Download Now

WHITEPAPER: Subdomain Takeovers

This whitepaper breaks down how malicious actors can take control over your website page. What is the impact to your organisation? 

Download now

Use case: ifm electronics

ifm's biggest challenge was to inventory their online assets, and to determine whose responsibility they were. Digital footprint mapping helps ifm improve their cyber-resilience and security workflow. 

Read more

Do you have a question?

Our experts have the answers

Contact us