Innovating in the battlespace: How commercial technology is impacting the defense sector Innovative use of commercial products, like consumer drones, are showing significant impact on the battlespace: from usage by...
Category Modules
From Readiness to resilience: strengthening cyber operations with AI to unlock competitive advantage
From Readiness to resilience: strengthening cyber operations with AI to unlock competitive advantage Cyber attacks can occur at any time, and proceed at unprecedented speed. In order to detect, protect, and respond in...
The New Discovery Layer: Preparing Retail for Agentic AI
The New Discovery Layer: Preparing Retail for Agentic AI We’re witnessing the early stages of a radical shift in digital commerce: the rise of AI shopping agents. It’s a transformation that redefines...
2026 Customer operations automation field guide
2026 Customer operations automation field guide In 20 minutes, learn a practical way to add Al without eroding trust. This guide gives you a simple lens to choose where automation helps, six tactics that lift both...
La Multi Factor Authentication sotto attacco: simulazione dal vivo di un attacco informatico
La Multi Factor Authentication sotto attacco: simulazione dal vivo di un attacco informatico Molte aziende si affidano alle funzionalità di sicurezza integrate di Microsoft, ma la sola MFA non basta più a fermare i...
EDR Killer VS Managed Endpoint XDR met live dreigingssimulatie
EDR Killer VS Managed Endpoint XDR met live dreigingssimulatie Cybercriminelen ontwikkelen tools die zijn ontworpen om endpointbeveiliging uit te schakelen voordat ze hun aanvallen lanceren. Deze zogenaamde ‘EDR...
MFA onder aanval: live simulatie cyberaanval
MFA onder aanval: live simulatie cyberaanval
Raynaud Schokkenbroek, ethical hacker en pentester, laat live zien hoe aanvallers een MFA-account kraken. Geen theorie. Geen drama. Gewoon de praktijk.
EDR-Killer stoppen – mit Managed Endpoint XDR auf der sicheren Seite
EDR-Killer stoppen – mit Managed Endpoint XDR auf der sicheren Seite Cyberkriminelle entwickeln zunehmend spezialisierte Werkzeuge, um Endpoint-Security-Lösungen gezielt zu deaktivieren, bevor sie ihre Angriffe starten...
EDR Killer VS Managed Endpoint XDR – live threat simulation
EDR Killer VS Managed Endpoint XDR – live threat simulation Cybercriminals are developing tools designed to disable endpoint protection before launching their attacks. These so-called ‘EDR killers’ can bypass...
Data Intelligence skalieren im Finanzsektor
Data Intelligence skalieren im Finanzsektor Finanzdienstleistungsunternehmen stehen an einem Scheideweg. Trotz hoher Investitionen in die digitale Transformation kämpfen viele immer noch mit fragmentierten Daten...
