Cyber Security & Privacy
Ransomware, malware, privacy breaches, CEO fraud, ID theft, phishing … cyber and privacy threats have an indelible position in our…
By now it is clear that COVID-19 has a significant impact on countries, organisations and citizens around the world. Each…
The geopolitical context of security is changing rapidly – as China rises, the US becomes more protectionist, and the EU…
Shadow IT might sound threatening to some people, as if it originates from a thrilling detective novel. In an organizational…
Purple team exercises are a fast way to improve your security monitoring function. By combining defense and offense in purple…
This article analyzes the origin of the open-source software (OSS) movement, how it relates to the ongoing trends in the…
Current measures for Business Continuity and Disaster Recovery are not fit for (future) purpose. Most of these measures are focused…
Many organizations across different sectors are increasing their digitization efforts, ultimately to deliver their products and solutions faster to the…
There is an increasing number of business applications on corporate mobile phones these days. There are threats to consider and…
Good enterprise content management is a must to secure your sensitive data. Especially given the astonishing pace at which the…
De Algemene Verordening Gegevensbescherming (AVG) noemt pseudonimisering als maatregel om tot een persoon herleidbare gegevens op passende wijze te beschermen….
In the past few years we have seen how the introduced data breach notification requirements have affected organizations in dealing…