Cyber Security AI-Pentesting: hoe honderden aanvalsscenario’s in minuten worden getest De opkomst van kunstmatige intelligentie (AI) is zowel fascinerend als verontrustend. Eén vraag komt steeds vaker terug: “Wat betekent AI precies voor onze cybersecurity?” En aanvullend: “Hoe kunnen wij er profijt van hebben?” De realiteit is glashelder: aanvallers gebruiken steeds... Explore Resource
The Pivotal Role of a Managed SOC 70% of medium-sized businesses reported breaches or attempted cyber-attacks within the last 12 months. In the UK, the total annual cost of cybercrimes for businesses is £21 million. You can’t hide from those numbers, so how can a best-of-breed Managed SOC play a part in reducing them? Read now
Cyber Security Building Layered Security and Proactive Threat Detection Build Layered Security & Proactively Manage Threat Detection Cyber threats can be categorised into opportunistic, material, and targeted attacks, each requiring different levels of preparedness. Opportunistic Attacks Random, large-scale attacks such as phishing emails that aim to exploit vulnerabilities without specific... Read now
Dora Compliance Checklist Prepare for DORA compliance! The enforcement date for DORA regulation is fast approaching – January 17, 2025. Financial institutions across the EU must be prepared for the upcoming changes, using tools like a DORA compliance checklist, as the act seeks to improve the digital resilience of financial entities against cyber threats. Read now
Predictions CISO-nary Visions for 2025 & Beyond As we reach the end of 2024 and look ahead, we’ve come to that magical time of year when the internet lights up with everyone suddenly becoming a Nostradamus of cyber, throwing out predictions left, right and centre. This year,... Read now
Cyber Security Onzichtbare Cloud-lekken: 5 veelvoorkomende misconfiguraties binnen financiële instellingen Cloudmigratie is voor financiële instellingen geen experiment meer. De druk wél. DORA, NIS2 en steeds scherper toezicht dwingen je om elke keuze voor de publieke cloud direct audit-proof te maken. CIO’s en CISO’s stellen me steeds vaker dezelfde vraag: “Waar... Explore Resource
Keeping up with endpoint threats Ever-growing cyber threats are a concern for everyone. But for IT leaders, the pressure has been ramped up to a new level. Tackling this can feel overwhelming, but it doesn’t need to be. Let’s go back to basics and start with endpoint protection. Read now
Webinar 30 oktober: De 5 verborgen digitale dreigingen die je bedrijf in 2025 kunnen stilleggen Webinar 30 oktober, 12:00-12:45: De 5 verborgen digitale dreigingen die je bedrijf in 2025 kunnen stilleggen Ontdek de actuele cyberrisico’s die vaak onzichtbaar blijven tot het te laat is. Recent viel een organisatie bijna om door een mail van hun... Explore Resource