Skip to main content
Coronavirus and Cyber Security

April 2020 - By now it is clear that COVID-19 has a significant impact on countries, organisations and citizens around the world. Each...

The new security nexus

April 2020 - The geopolitical context of security is changing rapidly – as China rises, the US becomes more protectionist, and the EU...

Emerging from the shadows

April 2020 - Shadow IT might sound threatening to some people, as if it originates from a thrilling detective novel. In an organizational...

The risks of open-source software for corporate use

April 2020 - This article analyzes the origin of the open-source software (OSS) movement, how it relates to the ongoing trends in the...

Surviving extreme scenarios in a digital reality

April 2020 - Current measures for Business Continuity and Disaster Recovery are not fit for (future) purpose. Most of these measures are focused...

Security principles for DevOps and cloud

April 2020 - Many organizations across different sectors are increasing their digitization efforts, ultimately to deliver their products and solutions faster to the...

Risk/control framework related to the security of mobile business applications

April 2020 - There is an increasing number of business applications on corporate mobile phones these days. There are threats to consider and...

Enterprise content management: securing your sensitive data

April 2020 - Good enterprise content management is a must to secure your sensitive data. Especially given the astonishing pace at which the...

Privacy pitfalls and challenges in assessing complex data breach incidents

April 2020 - In the past few years we have seen how the introduced data breach notification requirements have affected organizations in dealing...

Verified by MonsterInsights