Blog

Latest Blog Posts

EU eID Schemes Landscape

Electronic Identification (eID) is a digital solution for the identity proofing of citizens or organizations achieving mutual recognition of electronic identification schemes across borders and increases citizens confidence in the online world...
Read More

Digital transformation and the EU NIS Directive

There is an observed ongoing movement towards digital transformation during the very last years, not only in private and enterprise environments but also in critical national infrastructure operators...
Read More

You are as Strong as your Weakest Part

It is widely observed that supply chain attacks are on the rise. It is not a new type of attack but has gained true recognition during the last years. Numerous researches show an increase in breaches through supply chain communication channels...
Read More

The Value of a Penetration Test

In case you are wondering whether a penetration test offers any value to your organization, we have to first of all admit that there are two dimensions in answering this question: executives and technical...

Read More

Choosing between a Vulnerability Scan and a Penetration Test

The terms "vulnerability scan" and "penetration test" are oftentimes mistakenly used interchangeably, even by people involved with IT...
Read More

The Ideal Penetration Test Report

A penetration test report is the final deliverable in a penetration test engagement. It is a detailed document that guides you through the findings, vulnerabilities detected, exploitation actions and provides mitigation recommendations....
Read More