Category: Cybersecurity & Digital Trust

Purple Teaming for OT:  How to switch from a compliance to a performance mindset?

In our previous articles of this OT cybersecurity monitoring series (Cybersecurity monitoring for OT / Cybersecurity tooling strategy), we explained the current state of OT detection capabilities and discussed the right tooling strategy.  This third article focuses on a key question: how do you measure the efficiency of…

Anti-Deepfake Solutions Radar: An Analysis of the AI-Generated Content Detection Ecosystem 

 A deepfake is a form of synthetic content that emerged in 2017, leveraging artificial intelligence to create or manipulate text, images, videos, and audio with high realism. Initially, these technologies were used for entertainment or as demonstrations of future capabilities. However, their malicious misuse now…

Protecting Connected Instruments: A Growing Challenge for Laboratories

Laboratory Equipment: An Overlooked Cybersecurity Risk Industries such as pharmaceuticals, chemicals or agri-food heavily rely on laboratory equipment, especially for quality control, R&D or chemical analysis. These instruments are vital for numerous business processes, many of which are critical for…

Artificial intelligence has become a staple of cybersecurity marketing featured in product claims, pitch decks, and dashboards alike. “Autonomous scanning”, “AI-driven risk scoring”, “Remediation Execution”: claims like these are now standard in cybersecurity marketing. But when you peel back the…

Back to top