What DORA Means for ICT Suppliers: MSPs, SaaS and Cloud in Scope
If you provide ICT (information and communication technology) services to financial institutions in the EU – whether managed services, SaaS…
If you provide ICT (information and communication technology) services to financial institutions in the EU – whether managed services, SaaS…
Cybersecurity extends beyond preventing malware and protecting your code. Learn how to open the 443 port to beef up your…
Senior ministers and national security officials have called on boards to take urgent action to strengthen their organisations’ cyber resilience.…
Fraudulent and typo-squatted domains are growing threats that enable phishing and brand impersonation. Learn how domain takedowns protect your organization…
Internal audits are essential to ISO 27001 compliance, as mandated by Clause 9.2 – but what does it actually take…
CyberHoot's Newsletter, October 2025 version. Read up on CyberHoot's latest articles, updates, and testimonials from current customers! The post CyberHoot…
It sometimes seems that each new supply-chain security breach we see in the news affects more organisations than the last…
Today, 21 October, is Global Encryption Day. Led by the Global Encryption Coalition, the campaign’s message is simple: “In uncertain…
OpenAI’s latest threat report reveals how hackers and scam networks are using AI to supercharge phishing, fraud, and social engineering.…
Post Content