Skip to main content
What Are You Doing to Keep My Data Safe?

July 2016 - Consumers are becoming increasingly savvy and aware of the sensitivity of their data, underscored by numerous high profile data breaches...

Playing in a Mobile World

July 2016 - The story of Pokémon Go makes an excellent case for the current reality in IT: we are living in a...

Ruthless and Rational Cyber Criminal Entrepreneurs

July 2016 - This article provides a review of the key trends and changes in the cyber crime landscape, recognizing that cyber criminals...

Cyber Threat Intelligence

July 2016 - Interview by Jeroen de Wit Nowadays, one of the most booming topics in the cybersecurity market is Cyber Threat Intelligence....

What’s Trending in Cyber Security?

July 2016 - To know when it will start raining, we check the weather app. To find out if there are any traffic...

The Return to the Customer: Three Strategic Choices of Privacy Management

July 2016 - With the recent changes in rules and regulations, and academics stating that privacy is confusing, it is not a surprise...

Cyber in the Boardroom

July 2016 - An organization’s board does not only have a key responsibility for securing information assets, but they are in the best...

Cyber Security: A Paradigm Shift in IT Auditing

July 2016 - With the fast increase of cyber crime, companies are regularly being compromised by hackers. In many cases this is to...

SAP Landscape Security: Three Common Misconceptions

July 2016 - SAP is an attractive target for cyber attacks for both malicious insiders and external actors, aiming to attack critical business...

A Journey into the Clouds

July 2016 - Software as a Service (SaaS) solutions have been around for years and organizations are starting to move on a larger...

How Cyber Security Conquers the To-Do List of the Board

July 2016 - Awareness. You must have stumbled across this word hundreds of times when reading about the issue of cyber security. The...