-
How smart is the use of smart devices in the office?
The case of industrial cleaning robots in the NetherlandsFirewalls, end-to-end encryption, private cloud, no smartphones during meetings. This is a small selection of the measures that organizations are…
-
How disinformation might hurt your business
And why you are more prepared than you thinkDisinformation is a cybersecurity threat and should therefore be treated as such. Fortunately, a lot of cybersecurity measures can be…
-
Trends, challenges & evolution of security monitoring in the evolving digital landscape
Interview with Adwait Joshi, Director of Product Marketing for Azure Security, MicrosoftSociety is becoming increasingly dependent on digitized processes and systems ([NCTV19]). This trend is also apparent within organizations. As the…
-
Cyber security in mobility
Shifting the focus from mobility safety towards mobility securityTechnological breakthroughs are affecting the mobility ecosystem at a rapid pace. The continuing developments within the mobility sector raise questions…
-
Improved payment security implies innovation in authentication
SMS authentication codes should disappear but multi-factor authentication needs accelerationInnovation in the online payment sector should go hand in hand with innovation in authentication. There is a battle against…
-
The new security nexus
Cyber security and digitalization in disruptive timesThe geopolitical context of security is changing rapidly – as China rises, the US becomes more protectionist, and the EU…
-
Security principles for DevOps and cloud
Delivering value frequently while balancing cyber riskMany organizations across different sectors are increasing their digitization efforts, ultimately to deliver their products and solutions faster to the…
-
Emerging from the shadows
Why business ownership is the answer to managing the risk of Shadow ITShadow IT might sound threatening to some people, as if it originates from a thrilling detective novel. In an organizational…