Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.