Todor Majti

Todor Majti

Cyber Risk Quantification. Knowing The Unknown Territory

Cyber Risk Quantification

Cyber Risk Quantification. Knowing The Unknown Territory Explore the world of Cyber Risk Quantification in our latest blog. Get insights on effective CRQ models Cyber Risk Quantification. Knowing The Unknown Territory Organisations face various digital threats, from malicious hackers seeking…

Cyber Security Trends 2023

Cyber Security Trends 2023

Cyber Security Trends 2023 Explore the dynamic cyber security trends 2023, from AI to nation-state threats. Stay ahead in the ever-evolving digital landscape. Cyber Security Trends 2023 As we venture into 2023, cyber security is poised for a year of…

MFA Bombing – How to Protect Your Users

mfa bombing

MFA Bombing – How to Protect Your Users Introduction / Summary For a moment, we felt a sense of security, when we implemented Multi-Factor Authentication (MFA) for our critical users, Yet, another form of attack has emerged, known as MFA…

Identity And Access Management (IAM)

Identity and access management

Identity And Access Management (IAM) Enhance security with Identity and Access Management (IAM). Explore strategies, trends, and best practices in modern cybersecurity. Identity And Access Management (IAM) In the ever-expanding digital landscape, where information flows seamlessly across networks and devices,…

Multi-Factor Authentication (MFA)

Multi-Factor Authentication

Multi-Factor Authentication (MFA) Enhance your security with Multi-Factor Authentication (MFA). Discover its benefits, trends, and future potential in our blog post. Multi-Factor Authentication (MFA) Multi-Factor Authentication, often abbreviated as MFA, is a cutting-edge security mechanism designed to add multiple layers…

Human Error As Reason For The Data Breach

data breaches by human error

Human Error As Reason For The Data Breach Impact of data breach by human error. Learn how unintentional mistakes can lead to security vulnerabilities and sensitive data exposure. The Data Breach by Human Error As organisations increasingly rely on technology…

Modern Vehicles Hacking

Automotive Hacking

Modern Vehicles Hacking Explore the realm of automotive hacking and its implications. Stay informed about the risks and safeguards in modern vehicles. Modern Vehicles Hacking In today’s digital age, where technology has seamlessly integrated into every facet of our lives,…

Backup and Recovery Best Practices for Data Protection

Backup and recovery

Backup and Recovery Best Practices for Data Protection Discover essential backup and recovery best practices for data protection. Safeguard your valuable information with effective backup and recovery strategies. Backup and Recovery Best Practices for Data Protection Data is a critical…

Free Subscription

The most comprehensive Cybersecurity agenda for leading industry executives

Connect and share niched and unique knowledge

Meet our 15-year experience in addressing international cybersecurity challenges

Register for The Conference
25th of May 2023