• SAP: What is the SAP migration for 2027?

    SAP is one of the largest software companies in the world, providing enterprise application software [...]

  • What does a CISO need to know about SAP SECURITY?

    by Sükrü ilkel Birakoglu, Senior DirectorSAP Systems had their evolution in years from closed mainframes [...]

  • Crypto mining: Understanding and Protecting Against Cryptojacking

    We take it by now you have heard of crypto currency, so we won’t insult [...]

  • Critical Infrastructure: Protecting Health Service Data

    There are few sectors where privacy is as essential as it is in healthcare. People's [...]

  • Ransomware-as-a-Service (RaaS) – A Growing Threat in Cybersecurity

    In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]

  • Critical Infrastructure: KRITIS and SAP systems

    by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]

  • Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]

  • Critical Infrastructure: Five biggest threats to banks

    When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]

  • How can MSSPs leverage knowledge for multiple customers? Tips & Tricks for MSSPs

    By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]

  • Embracing randomness to detect threats through entropy

    By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]

  • Hive hunter: The tools and tactics to track down Hive ransomware

    By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]

  • Critical Infrastructure: Cybersecurity And The World Economy

    You may have noticed that, over the last two years, it seems that cyberattacks are [...]