Digital Trust: Cyber Security, Privacy & Ethics
The Zero Trust framework provides high-level principles to be applied to an enterprise architecture in order to protect its workloads…
Firewalls, end-to-end encryption, private cloud, no smartphones during meetings. This is a small selection of the measures that
Mobility 2030
RDW is tasked with the formal approval of vehicle types and vehicle parts and therefore also with the approval of…
Technological breakthroughs are affecting the mobility ecosystem at a rapid pace. The continuing developments within the mobility
Interview by Jeroen de Wit Nowadays, one of the most booming topics in the cybersecurity market is Cyber Threat Intelligence….
With the fast increase of cyber crime, companies are regularly being compromised by hackers. In many cases this is to…
To know when it will start raining, we check the weather app. To find out if there are any traffic…
The story of Pokémon Go makes an excellent case for the current reality in IT: we are living in a…
This article provides a review of the key trends and changes in the cyber crime landscape, recognizing that cyber criminals…