Focus

The psychology behind social engineering

Are there human traits that might be especially receptive to the art of social engineering? Let‘s find out!

Read more


Is ransomware dead?

We observed cryptocurrency mining incidents taking over from ransomware incidents. Let‘s dive in!

Read more


Pentesting Stories: Errors and limited hygiene lead to full domain compromise

Full domain compromise from moving some of your customer-facing operations to a private cloud? Find out in this pentesting story!

Read more

With over 15 years of experience, we are trusted by some of the world’s largest brands.
We are experts at designing, delivering, managing and supporting leading cyber security solutions.

Secure the Cloud.

Cloud gives you flexibility, scalability and agility. But how do you secure your processes? Understanding cloud-specific requirements allows you to plan, design, implement and run your cybersecurity program efficiently.

Read more

Managed detection & response.

Detecting and responding to todays world of evolving threats is a critical ability that requires continuous improvements. Do it right and your risk will decrease significantly and your productivity will go up. There is no such thing as 100% protection. Once you have accepted this statement it is time that you start adressing the threats you could not protect against with detection and response.

Read more