Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while taking into account our business…
Black hat hackers have become increasingly professional in recent years
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.
Time to take a closer look at the 7 benefits pentests have for your company.
Today, it is also unthinkable for SMEs to function without information technology or access to the Internet, let alone remain competitive with the larger companies…