top of page
Mar 29, 20242 min read
XZ Compression Backdoor, Linux Distros and Supply Chain Attack
The discovery of a sophisticated backdoor lurking within the popular xz/liblzma compression software recently sent shockwaves through the...
Mar 8, 20242 min read
Navigating Cybersecurity in Mergers and Acquisitions: A Holistic Approach
Mergers and acquisitions (M&As) are pivotal to the growth strategies of numerous companies, serving as a linchpin for maintaining a...
Dec 5, 20234 min read
Preparing for DORA Compliance: Strengthening ICT Supplier Risk Management in Finance
The Digital Operational Resilience Act (DORA) Explained The Digital Operational Resilience Act (DORA) is a comprehensive regulatory...
Nov 27, 20232 min read
Strengthening Supply Chain Defenses Against Ransomware: Insights from Xplain and Concevis Incidents
The ransomware attacks on Xplain and Concevis, two Swiss IT service providers, represent critical case studies in understanding the...
Nov 21, 20234 min read
Harnessing C2SEC's XSPM to Empower Gartner's CTEM Framework
In the complex and ever-changing landscape of cybersecurity, Gartner's Continuous Threat Exposure Management (CTEM) framework, introduced...
Oct 17, 20232 min read
The Hidden Risks of Third-Party App Consents in Microsoft 365
As we delve deeper into the intricacies of managing critical SaaS dependencies like Microsoft 365 within the broader context of attack...
Oct 4, 20232 min read
Introducing XSPM: Redefining the Paradigm in Attack Surface and Security Posture Management!
We are excited to unveil XSPM, our transformative Extended Security Posture Management SaaS platform. This innovation marks a pivotal...
bottom of page