We all take our uninterrupted, constantly on-demand supply of energy for granted so easily, but sometimes forget the underlying infrastructure
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Join our panel on security as an enabler of digital growth on November 25th
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…
How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while taking into account our business…
Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…