Home i-SCOOP – latest articles

i-SCOOP – latest articles

SaaS security in an expanding reality of third-party connected apps

Cloud security on the level of SaaS (Software as a Service) is less straightforward than people often think, especially now that the use of SaaS applications and SaaS-to-SaaS connections is more vast than ever and SaaS security is confronted...

TQM (Total Quality Management) in a Quality 4.0 context – meaning and role

TQM stands for Total Quality Management. It is an approach to management that focuses on continuously improving organizational processes, products, and services. TQM aims to meet or exceed customer expectations and customer experience by involving all employees in the...

The impact of remote work from a mobile security perspective: work ahead

The number of cyberattacks and cyber risks continues to rise. In 2022, we again broke several cybercrime and cybersecurity records, including regarding the cost of a data breach and phishing, to name a few. The increased cybersecurity concerns have not...

The record-breaking average cost of a data breach in 2022

The global 'DataSphere' continues its exponential growth, with more data being created, captured, and replicated than ever before in history. Consequently, it seems logical that organizations try harder to avoid data breaches and leaks, even if not all data...

Why cyber risk (exposure) is increasingly challenging to manage

Companies appear to be having an increasingly difficult time assessing cyber risk exposure, making managing cyber risk a more challenging task than ever. There are a bunch of reasons why such is the case. Before looking in more detail at...

The attack surface and importance of attack surface management

The rapid and continuous expansion of organizations' attack surface and digital footprint has led to (external) attack surface management being one of the most important cybersecurity trends in 2022.  Attack surface management (ASM) is hot. In fact, several factors are...

Smart factory security challenges and threats as cyber attacks increase   

By definition, the digital transformation of manufacturing and Industry 4.0 are highly connected phenomena on various levels. The same goes for smart factories. In somewhat more mature stages, smart manufacturing is an ecosystem play, connecting various stakeholders on levels of...

IT security spending patterns and priorities Europe 2022-2026

IT security spending of organizations in recent years has been heavily influenced by a succession of 'events' that had little to do with their strategic digitalization goals. Ideally, IT and cybersecurity budgets focus on an outcome such as enabling digital...

What is vishing or voice phishing and why is it on the rise?

Vishing or voice phishing is a method used by scammers to obtain credentials from victims. As the name indicates, the main difference between vishing and 'classic' phishing is the used medium to do so. Whereas phishing traditionally relies on email,...