The lessons of one year GDPR
Ideally, you ensure that all sensitive information is "secured by design"
A year of GDPR in the Netherlands: Cyber risks and data breaches
It has already been over a year since the General Data Protection Regulation (GDPR) entered into…
Can you use malware to bypass a data diode system with radio waves?
Is it possible to break the ‘unbreakable’?
Your trust, our signature
Signing phishing mails to fake trust
New ransomware also hits the Netherlands
Dozens of companies have been affected
Phishing – Ask and ye shall receive
Impersonating everyday applications for profit
Cost of cyber incidents a limiting factor to M&A?
When an incident turns into a catastrophe
Bokbot: The (re)birth of a banker
Connecting a new threat to an old threat actor group: Neverquest
SMS-authentication is no longer sufficient for IT-administration
6 questions and answers about 2-factor authentication
Catching an insider spy
The risk of insider threats for organisations