Drones and Cyberattacks: The Latest Threats to Our Airspace

Cyberattacks and drone attacks frighten us – when we see the latest threats to European airports, we ask ourselves; how can this happen?
Driving Progress, Redefining Risk and Insurance

In an era where artificial intelligence is woven into every aspect of business, the hidden dangers of unsanctioned AI tools are increasingly coming to light.
Cybersecurity Under Fire: What’s at Play Today (and Why Every Business Should Care)

During a recent panel discussion organised by GrECo Czech Republic, experts in insurance and cyber security examined the most critical cybersecurity challenges and strategies.
Shadow AI: The Unseen Risk Lurking in Your Company Infrastructure

In an era where artificial intelligence is woven into every aspect of business, the hidden dangers of unsanctioned AI tools are increasingly coming to light.
Upcoming AI Act EU Compliance Deadline

The risk-based classification system outlines AI compliance requirements for companies and includes a timeline, with the next key date set for 2 August 2025.
Six Critical Vulnerabilities Making the Construction Industry a Prime Target for Cyber Attacks

Anita Molitor, Cyber Specialist at GrECo Specialty identifies why the industry is increasingly vulnerable to cyber threats and what construction businesses can do to protect themsleves.
EU Cybersecurity Legislation Series: Getting to Grips with the Cyber Resilience Act and the Artificial Intelligence Act

We turn our attention to two other critical pieces of legislation: the Cyber Resilience Act (CRA) and the Artificial Intelligence Act (AI Act).
EU Cybersecurity Legislation Series: Understanding DORA and NIS2

European Union has introduced several critical regulations aimed at bolstering cyber resilience and securing the economy
AI in Cybersecurity: Risk, Replacement, or Reinforcement?

Can AI ever fully replace human judgment? And perhaps most crucially, how can AI and human expertise complement one another to bolster cybersecurity?
Will You Be The Next Company to Fall Victim to a Cybersecurity Fallout?

We should be discussing cyber risk management strategies now, not waiting for an incident to occur!