Attack surface

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data

Written by: Roman Faithfull and Olivia Betts Since the start of the war, Russia has been introducing new laws and making amendments to existing ones to expand the scope of its digital authoritarianism. These changes assist the state in tracking, repressing, and manipulating domestic and foreign populations. Almost immediately following the outbreak of the so-called “Special […]

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data Read More »

Cyber Supply Chain Risk Management: Challenges and Best Practices 

Global supply chains have become increasingly complex and vulnerable to cyber risks in recent years, with many ever-evolving threats ranging from ransomware attacks to unauthorised system access. Recognising the importance of implementing management strategies that counter such intentions is easy.  This article will relay valuable information about the challenges within cyber supply chain management and

Cyber Supply Chain Risk Management: Challenges and Best Practices  Read More »

Alert Fatigue in Cybersecurity: What Is It and how do we manage it?

The problem of alert fatigue, also known as alarm fatigue or notification fatigue, is widely spread across various industries, such as healthcare, construction, information technology and cybersecurity. Although this issue affects different sectors similarly, the cybersecurity industry experiences the most severe and complex consequences of the phenomenon.  Cybersecurity teams are becoming overwhelmed by the ever-increasing

Alert Fatigue in Cybersecurity: What Is It and how do we manage it? Read More »

Scroll to Top