Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
The CAF - A tool for assessing cyber resilience
The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the…
The AI Controls Matrix (AICM) provides a foundational security and governance framework for AI service providers and customers. It helps them securely…
The rapid adoption of Generative AI (GenAI) is transforming organizational workflows. However, it's also escalating risks related to data privacy, int…
The Domain Name System (DNS) is an integral part of any enterprise network architecture. An attack against the DNS infrastructure of an enterprise thr…
The Anatomy of a Confused Deputy Attack Chain
For purposes of this analysis, a confused deputy attack on an AI agent can be understood as a fourstage …
Unlock the power to take control of your cybersecurity—without spending a dime. Dr. Joe Trust reveals a revolutionary, free tool designed specifically…
SIGS 27th SOC Forum March 25th, 2026
SIGS 27th SOC Forum March 25th, 2026
SIGS 27th SOC Forum March 25th, 2026
As artificial intelligence (AI) is integrated into commercial and government applications, there is growing demand to monitor these systems after epl…
Executive Summary
Cybersecurity in 2026 is accelerating amid growing threats, geopolitical fragmentation and a widening technological divide. Artifici…
This second edition of the INTERPOL Global Financial Fraud Threat Assessment examines how the fraud landscape has evolved over the past two years, hig…
This white paper explores the evolution of the CISO role in the face of rising complexity, outlining how this complexity manifests, what it demands of…