Information Technology Assessment
SIQ Expands Services to Support Compliance with New Cybersecurity Directive
SIQ is proud to announce that it is now fully equipped to assist customers in meeting the requirements of the new EU Cybersecurity Directive. This expansion of services is designed to help businesses safeguard their digital infras...
Find out moreEven hackers wear (protective) masks, part 2
In part 1 of this blog series, we considered two fundamental goals of cyber attackers, i.e. remote control of a victim and covert persistence from the attacker’s "...
Find out moreEven hackers wear (protective) masks, part 1
The leakage or theft of sensitive information constitutes a serious security breach or a form of cybercrime. Hence, it is not uncommon that security experts consider data exfiltration as one of the more representative targets of motivated cyber at...
Find out more