Insight: Security

In this Insight, we discuss the most important topics regarding cyber security. Security should be high on the agenda of every organisation by now. The number of malware attacks and data leaks is at an all-time high. What can your organisation do to become safer and reduce risks?

Ransomware


One of the types of attack many companies fear is ransomware. In many reports, this form of malicious attack is the most common. When companies become a victim of ransomware, the consequences will impact the business considerably during a more extended period.

Securing the company network to the cloud and the home offices


Another subject that requires careful consideration is network security. Not only the company network but also the cloud and home offices. Home offices have become a popular gateway to the corporate network for cybercriminals during the COVID pandemic. However, many security measures for home networks are different from those for traditional company networks.

What is also striking is that the security industry is fundamentally flawed. By this, we mean that many investments do not deliver what was expected or hoped for. Things can and must get better.

We also discuss many other important topics, such as API security and SASE.

"*" indicates required fields

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.
Software’s post-pandemic recessionary lag factor 

Software’s post-pandemic recessionary lag factor 

Knowledge is power. But further than any mere level of learning by rote understanding, we use the term ‘savvy’ to denote a particular level of practical knowledge and ability. Coming out of the post-pandemic period of preparation for the ensuing recession will (arguably) require more savvine... Read more

date14 days ago
OT security of data centers should be a top priority

OT security of data centers should be a top priority

Virtually all incidents start at a data center. Yet the OT security of data centers in particular is often substandard. This has to change, Secior believes. OT security must play a much greater role in the security strategy of organizations and providers of data center services. Organizations pu... Read more

date1 month ago
Modern organizations can no longer do without a security fabric

Modern organizations can no longer do without a security fabric

Increasing complexity of organizations' environments poses questions that a security mesh architecture can answer. The number of cybersecurity solutions within organizations is constantly increasing. They have to be, because the environments of these organizations are also becoming increasingly ... Read more

date2 months ago
GTT well-positioned to provide SASE in a dynamic world

GTT well-positioned to provide SASE in a dynamic world

GTT is fully committed to SASE, or Secure Access Service Edge. It does so in its own way. We spoke with Mark de Haan, SVP Central Europe at GTT Communications. What makes Secure Connect, the SASE offering from GTT, unique? Why, as a customer, should you go for GTT and not for one of the many dozens... Read more

date3 months ago
Armis Security provides insight into IT, OT and IoT vulnerabilities

Armis Security provides insight into IT, OT and IoT vulnerabilities

New security vendor in our region promises insight into the vulnerability of all conceivable assets within the organization and does this in a user-friendly and simple way. If you really want to tackle security properly, you must first know what you have in terms of assets, and what these assets... Read more

date7 months ago
How do you interpret the results of MITRE ATT&CK evaluations?

How do you interpret the results of MITRE ATT&CK evaluations?

Not all detections are created equal. Keep that in mind when choosing cybersecurity tools. The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more

date7 months ago
Ransomware is an APT, so you should treat it as such

Ransomware is an APT, so you should treat it as such

Research from Splunk's SURGe division shows that there are major differences between ransomware variants in how fast they operate. Why is that important for organizations to know? And what does that mean for Splunk's product offering? We talk about the above and other issues with Johan Bjerke, P... Read more

date8 months ago
EU proposes rules for EU bodies to prevent cybersecurity attacks

EU proposes rules for EU bodies to prevent cybersecurity attacks

The European Commission said that EU nations should establish a framework to manage cybersecurity threats at EU institutions amid fears about growing cyberattacks that might interrupt essential activities and gain unauthorized access to sensitive data. The idea is part of a package of proposed E... Read more

date9 months ago