April 2020 - Ransomware, malware, privacy breaches, CEO fraud, ID theft, phishing … cyber and privacy threats have an indelible position in our...
April 2020 - By now it is clear that COVID-19 has a significant impact on countries, organisations and citizens around the world. Each...
April 2020 - The geopolitical context of security is changing rapidly – as China rises, the US becomes more protectionist, and the EU...
April 2020 - Shadow IT might sound threatening to some people, as if it originates from a thrilling detective novel. In an organizational...
April 2020 - Purple team exercises are a fast way to improve your security monitoring function. By combining defense and offense in purple...
April 2020 - This article analyzes the origin of the open-source software (OSS) movement, how it relates to the ongoing trends in the...
April 2020 - Current measures for Business Continuity and Disaster Recovery are not fit for (future) purpose. Most of these measures are focused...
April 2020 - Many organizations across different sectors are increasing their digitization efforts, ultimately to deliver their products and solutions faster to the...
April 2020 - There is an increasing number of business applications on corporate mobile phones these days. There are threats to consider and...
April 2020 - Good enterprise content management is a must to secure your sensitive data. Especially given the astonishing pace at which the...
April 2020 - In the past few years we have seen how the introduced data breach notification requirements have affected organizations in dealing...