Insight: Security

In this Insight, we discuss the most important topics regarding cyber security. Security should be high on the agenda of every organisation by now. The number of malware attacks and data leaks is at an all-time high. What can your organisation do to become safer and reduce risks?

Ransomware


One of the types of attack many companies fear is ransomware. In many reports, this form of malicious attack is the most common. When companies become a victim of ransomware, the consequences will impact the business considerably during a more extended period.

Securing the company network to the cloud and the home offices


Another subject that requires careful consideration is network security. Not only the company network but also the cloud and home offices. Home offices have become a popular gateway to the corporate network for cybercriminals during the COVID pandemic. However, many security measures for home networks are different from those for traditional company networks.

What is also striking is that the security industry is fundamentally flawed. By this, we mean that many investments do not deliver what was expected or hoped for. Things can and must get better.

We also discuss many other important topics, such as API security and SASE.

Stay tuned, subscribe!

Nieuwsbrieven*
This field is for validation purposes and should be left unchanged.
Armis Security provides insight into IT, OT and IoT vulnerabilities

Armis Security provides insight into IT, OT and IoT vulnerabilities

New security vendor in our region promises insight into the vulnerability of all conceivable assets within the organization and does this in a user-friendly and simple way. If you really want to tackle security properly, you must first know what you have in terms of assets, and what these assets... Read more

date1 month ago
How do you interpret the results of MITRE ATT&CK evaluations?

How do you interpret the results of MITRE ATT&CK evaluations?

Not all detections are created equal. Keep that in mind when choosing cybersecurity tools. The cybersecurity market is very fragmented. Organizations looking to improve their security posture have a tremendously wide range of solutions to choose from. This ensures that there are many offerings f... Read more

date1 month ago
Ransomware is an APT, so you should treat it as such

Ransomware is an APT, so you should treat it as such

Research from Splunk's SURGe division shows that there are major differences between ransomware variants in how fast they operate. Why is that important for organizations to know? And what does that mean for Splunk's product offering? We talk about the above and other issues with Johan Bjerke, P... Read more

date3 months ago
EU proposes rules for EU bodies to prevent cybersecurity attacks

EU proposes rules for EU bodies to prevent cybersecurity attacks

The European Commission said that EU nations should establish a framework to manage cybersecurity threats at EU institutions amid fears about growing cyberattacks that might interrupt essential activities and gain unauthorized access to sensitive data. The idea is part of a package of proposed E... Read more

date3 months ago
Fortinet guarantees secure network access with Zero Trust

Fortinet guarantees secure network access with Zero Trust

Zero Trust is seen as an essential security model to secure enterprise networks. However, security vendors envision the model in different ways. Fortinet determined that secure network access should be the goal. We discussed the topic with Robert Tom, Systems Engineer at Fortinet. The idea behin... Read more

date6 months ago
Don’t make cybersecurity the end user’s problem

Don’t make cybersecurity the end user’s problem

Human beings are the weakest link in the chain of cybersecurity, you often hear. Roel van Rijsewijk from Thales is very annoyed about this approach. The reason for this is that the responsibility in this area lies not with the people who deal with it, but with the end users. That must and can be do... Read more

date11 months ago