Home i-SCOOP – latest articles

i-SCOOP – latest articles

The impact of remote work from a mobile security perspective: work ahead

The number of cyberattacks and cyber risks continues to rise. In 2022, we again broke several cybercrime and cybersecurity records, including regarding the cost of a data breach and phishing, to name a few. The increased cybersecurity concerns have not...

The record-breaking average cost of a data breach in 2022

The global 'DataSphere' continues its exponential growth, with more data being created, captured, and replicated than ever before in history. Consequently, it seems logical that organizations try harder to avoid data breaches and leaks, even if not all data...

Why cyber risk (exposure) is increasingly challenging to manage

Companies appear to be having an increasingly difficult time assessing cyber risk exposure, making managing cyber risk a more challenging task than ever. There are a bunch of reasons why such is the case. Before looking in more detail at...

The attack surface and importance of attack surface management

The rapid and continuous expansion of organizations' attack surface and digital footprint has led to (external) attack surface management being one of the most important cybersecurity trends in 2022.  Attack surface management (ASM) is hot. In fact, several factors are...

Smart factory security challenges and threats as cyber attacks increase   

By definition, the digital transformation of manufacturing and Industry 4.0 are highly connected phenomena on various levels. The same goes for smart factories. In somewhat more mature stages, smart manufacturing is an ecosystem play, connecting various stakeholders on levels of...

IT security spending patterns and priorities Europe 2022-2026

IT security spending of organizations in recent years has been heavily influenced by a succession of 'events' that had little to do with their strategic digitalization goals. Ideally, IT and cybersecurity budgets focus on an outcome such as enabling digital...

What is vishing or voice phishing and why is it on the rise?

Vishing or voice phishing is a method used by scammers to obtain credentials from victims. As the name indicates, the main difference between vishing and 'classic' phishing is the used medium to do so. Whereas phishing traditionally relies on email,...

The state and challenges of OT cybersecurity 2022

As recently mentioned, smart factory security continues to be a serious challenge. Yet, the same goes for operational technology (OT) and industrial cybersecurity in general, as a report on 2022 OT cybersecurity shows. Cyberattacks targeting organizations with OT environments and...

Smart manufacturing transformation priorities and challenges 2022 report

A look at the 2022 ISG Global Smart Manufacturing Pulse Survey and how the adoption of smart manufacturing evolves, including priorities and challenges. Over the past two years, organizations accelerated their digitization and digital transformation efforts in various domains at...