Articles Articles Limit toClear filterFind our servicesSearch06 May 2025 Frontline Insights: Lessons from a ransomware attack that also deleted backupsA ransomware attack on Company X not only encrypted important data but also deleted backups, leaving the company in a tough spot.Energy05 May 2025 Frontline Insights: The Norsk Hydro cyberattack – a reflection on the importance of securing digital identitiesA reflection on the importance of securing digital identitiesEnergy05 May 2025 Frontline Insights: Lessons from the Uber 2022 data breachThe 2022 Uber data breach stands as a compelling example of the importance of cybersecurity, revealing the vulnerabilities even major tech companies face. Energy13 June 2024 Improving your business resilience with Privileged Access Management (PAM) – What a CISO needs to know11 April 2024 From strategy to implementation: a short guide to the Identity Governance and Administration (IGA) roadmap15 March 2024 Leading change: The key to successful IAM project deployment15 February 2024 Digital identity is critical for successful e-commerce14 January 2024 Fortified business resilience is key – how to get there?07 September 2022 Recognizing the seven stages of a cyber-attack
06 May 2025 Frontline Insights: Lessons from a ransomware attack that also deleted backupsA ransomware attack on Company X not only encrypted important data but also deleted backups, leaving the company in a tough spot.Energy
05 May 2025 Frontline Insights: The Norsk Hydro cyberattack – a reflection on the importance of securing digital identitiesA reflection on the importance of securing digital identitiesEnergy
05 May 2025 Frontline Insights: Lessons from the Uber 2022 data breachThe 2022 Uber data breach stands as a compelling example of the importance of cybersecurity, revealing the vulnerabilities even major tech companies face. Energy
13 June 2024 Improving your business resilience with Privileged Access Management (PAM) – What a CISO needs to know
11 April 2024 From strategy to implementation: a short guide to the Identity Governance and Administration (IGA) roadmap