{"id":15828,"date":"2024-03-11T14:32:37","date_gmt":"2024-03-11T14:32:37","guid":{"rendered":"https:\/\/www.dionach.com\/?page_id=15828"},"modified":"2025-06-13T16:12:35","modified_gmt":"2025-06-13T15:12:35","slug":"research","status":"publish","type":"page","link":"https:\/\/dionach.com\/en-us\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15828\" class=\"elementor elementor-15828\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d399c4 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"2d399c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f3f14ee\" data-id=\"f3f14ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0767cc premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"e0767cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Prioritize, Keep Pace, <\/span><span class=\"premium-dual-header-second-header \">Prevail.<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7fd419f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7fd419f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-023c246\" data-id=\"023c246\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a38d2de premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"a38d2de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tRESEARCH\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb6bfb0 premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"cb6bfb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Our research and development program sets <\/span><span class=\"premium-dual-header-second-header \">industry standards in cyber security<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2fad8c7\" data-id=\"2fad8c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c9acb8 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"8c9acb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Dionach we are proud of our well-established research and development program. Our team of consultants are focused on continually uncovering new technical vulnerabilities in software and hardware, raising the bar in security assessment services and sharing our knowledge through whitepapers and various industry channels.<\/p><p>Through the responsible disclosure process we have published numerous vulnerabilities in leading software applications that our team has identified.<\/p><p>As part of our commitment to remaining vendor independent and offering the best technical solution to each client engagement, we also develop proprietary security tools for testing methods including vulnerability scanning, spear phishing and security auditing. In practice, our consultants have a wide range of commercial, open-source and custom tools at their disposal to deliver industry-leading outcomes for our client base.<\/p><p>Some of our custom tools are published as open source on Dionach\u2019s GitHub page:\u00a0<a href=\"https:\/\/github.com\/Dionach\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/Dionach.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0e8aa4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"d0e8aa4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f25d6e0\" data-id=\"f25d6e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-260edba premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"260edba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-title-container style1\">\n\t\t\t<h1 class=\"premium-title-header premium-title-style1\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\n\t\t\t\t\tTECHNICAL BLOG\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h1>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50b5e8c elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"50b5e8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;numbers&quot;,&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-28219 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/swift-cscf-v2026-what-you-need-to-know-and-why-it-matters\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"431\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?fit=768%2C431&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-28223\" alt=\"SWIFT\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?resize=300%2C168&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?resize=1024%2C574&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?resize=768%2C431&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1363585468.jpeg?resize=1536%2C861&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/swift-cscf-v2026-what-you-need-to-know-and-why-it-matters\/\" >\n\t\t\t\tSwift\u00a0CSCF\u00a0v2026: What You Need to Know (and Why It Matters)\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/swift-cscf-v2026-what-you-need-to-know-and-why-it-matters\/\" aria-label=\"Read more about Swift\u00a0CSCF\u00a0v2026: What You Need to Know (and Why It Matters)\u00a0\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t10th April 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-28201 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/cybersecurity-is-a-business-risk-what-nist-csf-2-0-changes-for-leaders\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"768\" height=\"429\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?fit=768%2C429&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-28204\" alt=\"cybersecurity leadership\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?resize=300%2C167&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?resize=1024%2C572&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?resize=768%2C429&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/04\/AdobeStock_1859304205.jpeg?resize=1536%2C857&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/cybersecurity-is-a-business-risk-what-nist-csf-2-0-changes-for-leaders\/\" >\n\t\t\t\tCybersecurity Is a Business Risk: What NIST CSF 2.0 Changes for Leaders\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/cybersecurity-is-a-business-risk-what-nist-csf-2-0-changes-for-leaders\/\" aria-label=\"Read more about Cybersecurity Is a Business Risk: What NIST CSF 2.0 Changes for Leaders\u00a0\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t10th April 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-27478 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?fit=768%2C512&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-27486\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=1536%2C1024&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\" >\n\t\t\t\tAI Security: The Operational Reality\u00a0\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\" aria-label=\"Read more about AI Security: The Operational Reality\u00a0\u00a0\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t25th March 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25750 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-compliance tag-dspt wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"431\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?fit=768%2C431&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-25757\" alt=\"Data Security and Protection Toolkit (DSPT) 2025\/2026 CAF\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=300%2C168&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=1024%2C575&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=768%2C431&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=1536%2C862&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\" >\n\t\t\t\tData Security and Protection Toolkit (DSPT) 2025\/2026 CAF\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\" aria-label=\"Read more about Data Security and Protection Toolkit (DSPT) 2025\/2026 CAF\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t1st December 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25736 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"421\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=768%2C421&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-25742\" alt=\"ISO 27001\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=300%2C165&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=1024%2C562&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=768%2C421&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=1536%2C842&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\" >\n\t\t\t\tFrom Policy to Practice: Penetration Testing for ISO 27001\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\" aria-label=\"Read more about From Policy to Practice: Penetration Testing for ISO 27001\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t27th November 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25635 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-email-security tag-phishing tag-social_engineering wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/iso-27001-ai-dont-rebuild-extend\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"419\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?fit=768%2C419&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-25637\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?resize=300%2C164&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?resize=1024%2C559&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?resize=768%2C419&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1770408071.jpeg?resize=1536%2C838&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/iso-27001-ai-dont-rebuild-extend\/\" >\n\t\t\t\tISO 27001 &amp; AI:\u00a0Don&#8217;t\u00a0Rebuild.\u00a0Extend.\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/iso-27001-ai-dont-rebuild-extend\/\" aria-label=\"Read more about ISO 27001 &amp; AI:\u00a0Don&#8217;t\u00a0Rebuild.\u00a0Extend.\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t25th November 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25543 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-email-security tag-phishing tag-social_engineering wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/email-security-isnt-working-why-most-organisations-are-still-at-risk-and-what-to-do-next\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"329\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?fit=768%2C329&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-25549\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?resize=300%2C129&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?resize=1024%2C439&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?resize=768%2C329&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1767053418.jpeg?resize=1536%2C659&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/email-security-isnt-working-why-most-organisations-are-still-at-risk-and-what-to-do-next\/\" >\n\t\t\t\tEmail Security\u00a0Isn\u2019t\u00a0Working!\u00a0Why Most Organisations Are Still at Risk\u00a0and What to Do Next?\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/email-security-isnt-working-why-most-organisations-are-still-at-risk-and-what-to-do-next\/\" aria-label=\"Read more about Email Security\u00a0Isn\u2019t\u00a0Working!\u00a0Why Most Organisations Are Still at Risk\u00a0and What to Do Next?\u00a0\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t21st November 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-25299 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/effective-ai-cyber-governance-frameworks-and-best-practices\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?fit=768%2C432&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-25307\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_1764461972.jpeg?resize=1536%2C864&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/effective-ai-cyber-governance-frameworks-and-best-practices\/\" >\n\t\t\t\tEffective AI Cyber Governance: Frameworks and Best Practices\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/effective-ai-cyber-governance-frameworks-and-best-practices\/\" aria-label=\"Read more about Effective AI Cyber Governance: Frameworks and Best Practices\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t10th November 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24635 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dionach.com\/en-us\/who-is-responsible-for-your-ai-decisions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?fit=768%2C432&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24641\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/09\/AdobeStock_1270531657.jpeg?resize=1536%2C864&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/who-is-responsible-for-your-ai-decisions\/\" >\n\t\t\t\tWho Is Responsible for Your AI&#8217;s Decisions?\u00a0\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/who-is-responsible-for-your-ai-decisions\/\" aria-label=\"Read more about Who Is Responsible for Your AI&#8217;s Decisions?\u00a0\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t1st September 2025\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"18\" data-next-page=\"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828\/page\/2\/\"><\/div>\n\t\t\t\t<nav class=\"elementor-pagination\" aria-label=\"Pagination\">\n\t\t\t<span aria-current=\"page\" class=\"page-numbers current\"><span class=\"elementor-screen-only\">Page<\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828\/page\/2\/\"><span class=\"elementor-screen-only\">Page<\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828\/page\/3\/\"><span class=\"elementor-screen-only\">Page<\/span>3<\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828\/page\/15\/\"><span class=\"elementor-screen-only\">Page<\/span>15<\/a>\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Prioritize, Keep Pace, Prevail. RESEARCH Our research and development program sets industry standards in cyber security At Dionach we are proud of our well-established research and development program. Our team of consultants are focused on continually uncovering new technical vulnerabilities in software and hardware, raising the bar in security assessment<\/p>\n","protected":false},"author":12,"featured_media":20052,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"content-type":"","footnotes":""},"class_list":["post-15828","page","type-page","status-publish","has-post-thumbnail","hentry","wpbf-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dionach - Cybersecurity Research &amp; Insights<\/title>\n<meta name=\"description\" content=\"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dionach - Cybersecurity Research &amp; Insights\" \/>\n<meta property=\"og:description\" content=\"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/research\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T15:12:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/\",\"name\":\"Dionach - Cybersecurity Research & Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1\",\"datePublished\":\"2024-03-11T14:32:37+00:00\",\"dateModified\":\"2025-06-13T15:12:35+00:00\",\"description\":\"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1\",\"width\":2048,\"height\":1367},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dionach - Cybersecurity Research & Insights","description":"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/research\/","og_locale":"en_US","og_type":"article","og_title":"Dionach - Cybersecurity Research & Insights","og_description":"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.","og_url":"https:\/\/dionach.com\/en-us\/research\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_modified_time":"2025-06-13T15:12:35+00:00","og_image":[{"width":2048,"height":1367,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@dionachcyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/research\/","url":"https:\/\/dionach.com\/en-us\/research\/","name":"Dionach - Cybersecurity Research & Insights","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/research\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/research\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1","datePublished":"2024-03-11T14:32:37+00:00","dateModified":"2025-06-13T15:12:35+00:00","description":"Access Dionach\u2019s latest cybersecurity research, threat analysis, and practical guidance to meet compliance deadlines and reduce security risks.","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/research\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/AdobeStock_369643512-1.jpeg?fit=2048%2C1367&ssl=1","width":2048,"height":1367},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Research"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/Ph4Ojq-47i","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=15828"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/15828\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/20052"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=15828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}