Our Resources

How to manage the third party risks posed by your critical suppliers

June 18, 2022 • 4 min reading

EU’s NIS 2 Directive to improve cybersecurity across European businesses

May 24, 2022 • 2 min reading

Subdomain enumeration tools and techniques

May 5, 2022 • 11 min reading

Why your digital footprint matters

April 20, 2022 • 12 min reading

How to manage unresponsive vendors in your third party risk management program?

March 30, 2022 • 13 min reading

Why is Attack Surface Management important

March 21, 2022 • 7 min reading

New cybersecurity project to decrease online vulnerability with the help of Flanders Innovation & Entrepreneurship funding

February 1, 2022 • 3 min reading

Attack Surface Management vs. Vulnerability Scanning vs. Penetration Testing

January 19, 2022 • 4 min reading

How Procurement, Risk Management and TPRM can collaborate against cyber risks

September 20, 2021 • 2 min reading

Why security ratings matter

August 13, 2021 • 1 min reading

How critical and non-critical third parties have an impact on your organization's TPRM

August 3, 2021 • 2 min reading

How remote connectivity and digital transformation impact your organization's security

July 21, 2021 • 2 min reading

Volkswagen suffered a data breach through a third party

June 15, 2021 • 1 min reading

Assessing the risks of your third parties. Part 2; setting up a third party risk management process (TPRM).

April 6, 2021 • 5 min reading

Assessing the risks of your third parties, part 1; an introduction.

April 6, 2021 • 2 min reading

How to check and maintain a view on the security and risk exposure of your digital footprint

April 6, 2021 • 2 min reading

The impact of your supply chain on your digital footprint

April 6, 2021 • 2 min reading

How to get a view on your digital footprint?

April 6, 2021 • 4 min reading

Your digital footprint and why it matters

April 6, 2021 • 2 min reading