top of page


Prepare for DORA Part 6 – Compliance & Security Best Practices for Cloud & SaaS Service Providers
As cloud and SaaS adoption continues to accelerate, they have become critical dependencies in the ICT supply chain of financial...
Mar 277 min read


Navigating Cybersecurity in Mergers and Acquisitions: A Holistic Approach
Mergers and acquisitions (M&As) are pivotal to the growth strategies of numerous companies, serving as a linchpin for maintaining a...
Mar 8, 20242 min read


Harnessing C2SEC's XSPM to Empower Gartner's CTEM Framework
In the complex and ever-changing landscape of cybersecurity, Gartner's Continuous Threat Exposure Management (CTEM) framework, introduced...
Nov 21, 20234 min read


The Hidden Risks of Third-Party App Consents in Microsoft 365
As we delve deeper into the intricacies of managing critical SaaS dependencies like Microsoft 365 within the broader context of attack...
Oct 17, 20232 min read


Introducing XSPM: Redefining the Paradigm in Attack Surface and Security Posture Management!
We are excited to unveil XSPM, our transformative Extended Security Posture Management SaaS platform. This innovation marks a pivotal...
Oct 4, 20232 min read
bottom of page