Ransomware is one of the most important cybersecurity threats that you as a company need to arm yourself against. Fortunately, the risk and impact of…
Did you know that the GDPR and SDLC re-inforce each other and that the GDPR can be used as the ideal business case to start…
Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…
Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…
Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…
Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…
After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…
To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…
Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.
As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…