More and more Belgian workers are now working from home to slow down the spread of the coronavirus. That is why it is important that…
The GDPR brings many challenges, but it is also an opportunity to create and leverage customer trust. When people trust a brand, they are more…
Apart from knowledge of GDPR, no BEL20 board member has a clear background in information and cybersecurity. This can be seen in a profile analysis…
Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…
Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…
Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…
Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…