7 tools to secure your Microsoft network for free

The rules are getting increasingly strict – look at the GDPR – and attackers are becoming ever more inventive. Luckily, an acceptable level of protection…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

5 tips for safe teleworking

More and more Belgian workers are now working from home to slow down the spread of the coronavirus. That is why it is important that…

7 ways to create trust by implementing the GDPR

The GDPR brings many challenges, but it is also an opportunity to create and leverage customer trust. When people trust a brand, they are more…

Cybersecurity is still too often overlooked in business strategy

Apart from knowledge of GDPR, no BEL20 board member has a clear background in information and cybersecurity. This can be seen in a profile analysis…

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…

Yes, you can protect your company against ransomware

Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…

Embedding GDPR in the secure development lifecycle (SDLC)

Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…

Threat modeling: what is it, how does it work and why is it so important?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…

React to incidents in an organised way by using the Playbook model

Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…

Start typing and press Enter to search

Shopping Cart