Insight: Security

In this Insight, we discuss the most important topics regarding cyber security. Security should be high on the agenda of every organisation by now. The number of malware attacks and data leaks is at an all-time high. What can your organisation do to become safer and reduce risks?

Ransomware


One of the types of attack many companies fear is ransomware. In many reports, this form of malicious attack is the most common. When companies become a victim of ransomware, the consequences will impact the business considerably during a more extended period.

Securing the company network to the cloud and the home offices


Another subject that requires careful consideration is network security. Not only the company network but also the cloud and home offices. Home offices have become a popular gateway to the corporate network for cybercriminals during the COVID pandemic. However, many security measures for home networks are different from those for traditional company networks.

What is also striking is that the security industry is fundamentally flawed. By this, we mean that many investments do not deliver what was expected or hoped for. Things can and must get better.

We also discuss many other important topics, such as API security and SASE.

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.
CrowdStrike: Navigating the sprawl of endemic automation

CrowdStrike: Navigating the sprawl of endemic automation

Cyber security and application security endpoint posture management company CrowdStrike has explained its mission to combat the so-called ‘software sprawl’ that exists today. The company suggests that the modern use of component-based cloud architectures, the interconnection of multiple Applica... Read more

date1 month ago
Digging deeper into software artifacts

Digging deeper into software artifacts

Software has artifacts. Spelled in correct English we would talk about artefacts, but because most of the planet's software artefacts exist (or were created in Silicon Valley), we tend to embrace the Americanization and say artifacts. But what are software artifacts, why do they exist in the first ... Read more

date3 months ago
CVSS 4.0 vulnerability scoring system incorporates OT, ICS and IoT

CVSS 4.0 vulnerability scoring system incorporates OT, ICS and IoT

The global vulnerability scoring system is getting a new version after eight years. CVSS 4.0 includes a focus on the cybersecurity of OT, ICS and IoT. CVSS 4.0 has been officially released by the Forum of Incident Response and Security Teams (FIRST). The scoring system is mostly known under the... Read more

date5 months ago
Darktrace/Cloud provides visibility and security for the cloud

Darktrace/Cloud provides visibility and security for the cloud

The new Darktrace/Cloud solution provides security teams better visibility into cloud architectures. This is to deliver strong threat detection and response and stop misconfigurations. Cloud environments change rapidly, often suffer from misconfigurations and increasingly incorporate new technol... Read more

date5 months ago
Barracuda wants customers to replace vulnerable ESG devices

Barracuda wants customers to replace vulnerable ESG devices

Barracuda Networks is facing a massive problem with its e-mail security products. All affected ESG appliances must be replaced, including those from customers who have already obediently installed a previously released patch. Email Security Gateway (ESG) appliances from Barracuda may be affected... Read more

date9 months ago
Cisco moves to better secure hybrid cloud environments and apps

Cisco moves to better secure hybrid cloud environments and apps

Cisco frequently uses the slogan "If it's connected, it's protected." As a giant in the networking industry and a player in the security market, it also has the expertise to tie these two domains together. With Cisco Secure Access and Multicloud Defense, the company is taking on many aspects of sec... Read more

date10 months ago
Verizon survey: ransomware is ubiquitous

Verizon survey: ransomware is ubiquitous

The Verizon Data Breach Investigations Report survey shows that ransomware is one of the leading variants in breaches. Yet statistically, the share of ransomware remains stable at 24 percent, while there were significant increases in previous years. Studies around breaches and incidents regularl... Read more

date10 months ago
Log4Shell in 2023: big impact still reverberates

Log4Shell in 2023: big impact still reverberates

Log4Shell hit the market hard at the end of 2021. According to a recent story we published, it's still one of the biggest vulnerabilities, 18 months after it initially appeared. How serious is the threat of Log4Shell in 2023? Log4Shell continues to haunt us. The exploitation of a vulnerability i... Read more

date10 months ago
AI creates identity crisis in security world

AI creates identity crisis in security world

Artificial intelligence is going to shake up security. RSA CEO Rohit Ghai stated at RSA Conference that it is becoming necessary to give AI more and more responsibility over securing digital environments. This particularly because IT security could otherwise be killed by that same technology. At... Read more

date11 months ago