Company News klaudia.jozwinskaDec 04, 2025 2 min Exclusive Holiday & St. Nicholas’ Day Offer: Full CDeX Access To celebrate St. Nicholas' Day and the upcoming Christmas holidays, the CDeX platform has prepared a special offer that grants unlimited opportunities for advancing cyber defense skills.
Cybersecurity InformationCDeXOct 31, 2024 3 min What Every Business Needs to Know About Cyber Incident Response
Cybersecurity Information CDeXJul 31, 2024 4 min Cyber Range for SMEs: Making Advanced Cybersecurity Training AccessibleSmall and medium-sized enterprises (SMEs) are increasingly targeted by cybercriminals, with nearly 60% of attacks now aimed at them. Despite the growing threats, many SMEs struggle with limited budgets and a lack of skilled IT staff, leaving them vulnerable.Advanced cybersecurity training, especially through cyber ranges, offers a solution. These realistic, hands-on training environments can help SMEs improve their defences without breaking the bank. This article explores how cyber ranges can make advanced cybersecurity training accessible to SMEs, providing the tools to protect themselves effectively.
Cybersecurity Information CDeXJul 18, 2024 3 min NIS vs NIS2: Analysing the Differences and Implications for Critical SectorsThe evolution and sheer number of cyber threats in recent years triggered an overhaul of the European Union's approach to cybersecurity, leading to the introduction of the NIS2 Directive. Building on the foundation laid by the original Network and Information Systems (NIS) Directive adopted on July 6, 2016, NIS2 addresses cybersecurity challenges facing critical infrastructures across the EU. Find out what are the differences between the two directives and the implications of the new laws.
Cybersecurity Information CDeXJul 04, 2024 3 min Human-Centric Security: The Key to Mitigating Social Engineering AttacksSocial engineering attacks have become a significant threat to cybersecurity. These attacks exploit human psychology rather than technical vulnerabilities, making them particularly dangerous. To combat these threats, a human-centric security approach is essential, focusing on the critical role employees play in defending against cyber threats.
Cybersecurity Information CDeXJun 24, 2024 4 min Time for a Change: A Guide for CISOs Contemplating a Job ChangeThe role of the Chief Information Security Officer (CISO) is undergoing significant transformation. As organizations struggle with increasingly complex cybersecurity threats and the evolving landscape of regulatory requirements, the expectations placed on CISOs are higher than ever. This heightened pressure, coupled with the dynamic nature of the cybersecurity field, has led to a notable trend: a significant portion of CISOs are contemplating a job change.
Cybersecurity Information CDeXJun 07, 2024 4 min Preparing for NIS2: Key Strategies to Ensure Organisational ComplianceThe NIS2 Directive significantly updates the EU's cybersecurity framework to ensure a higher level of security across all member states. This legislation, effective from October 2024, mandates enhanced measures for organisations that are crucial to infrastructure and economic stability of the region. Understanding and preparing for these changes is critical for compliance and protecting against cyber threats.
Technology Updates CDeXMay 22, 2024 3 min A Year in Development at CDeXThe past year has been a transformative period for the development team at CDeX. Through multiple releases, substantial updates, and rigorous quality monitoring, the team has successfully navigated the challenges of continuous improvement of our cyber range. Let’s have a look at key milestones and statistics from this past year, highlighting the dedication and innovation that define CDeX’s development efforts.
Cybersecurity Information CDeXApr 26, 2024 3 min Zero Trust Security Model — the Pros and Cons The Zero Trust Security Model has emerged as a beacon of hope for organisations defending against sophisticated threats and complex infrastructures. As enterprises continue to adapt to digital transformations, the traditional perimeter-based security models are no longer enough. Enter Zero Trust, a model that operates on a simple yet rigorous principle: trust no one, verify everyone. This article explores the intricate dance of advantages and disadvantages that this model brings to the table.
Cybersecurity Information CDeXApr 19, 2024 4 min Customized Training Scenarios for Specific Industry ThreatsCDeX delivers customized cyber readiness solutions that prepare organizations and their specialists for the specific challenges they face. Our approach deeply integrates with an organization’s culture and compliance needs, promoting a proactive security mindset essential for maintaining resilience against cyber threats.