Securing AI Platforms: Humans in the Loop vs. Humans on the Loop
AI is everywhere. New AI tools are rapidly becoming embedded in enterprise platforms, from security monitoring and data analytics to productivity tools and autonomous agents.
AI drives security budget growth
AI is the top cybersecurity budget driver, but oddly enough, also the number one target for cuts if budgets tighten and the hardest investment to justify.
CISO: Secure the Future
In this podcast, Dave Maasland talks to none other than Richard Marko, CEO of ESET. From the heart of Europe, he shares how ESET has been working on digital autonomy since day one – long before it became a bu
The Tea breach: the app that promised safety, then leaked it
[Members only] This week, an app to protect women has become the source of their harm: about 72,000 images – including about 13,000 user images submitted during account verification – were accessed in a bre
AI and application security: time savings and trust issues
Amidst the excitement surrounding AI, widespread misconceptions exist about its capabilities and limitations. Let us explore more.
From boots to bytes: a strategic shift in the Dutch military
This week, Defense Secretary Gijs Tuinman presented the Netherlands’ new digital transformation strategy to the House of Representatives. The strategy is designed to enhance the military’s digital capabilit
Cybersecurity doesn’t have a visibility problem: it has an execution problem
Security that waits to act is already too late. So, how do we fix it?
Dutch government commits 70 million euros to AI factory in Groningen
The Dutch government has announced a €70 million investment in a new artificial intelligence factory to be established in the city of Groningen.
TU Eindhoven hack highlights urgency of closing basic security gaps
The cyber attack on Eindhoven University of Technology (TU/e) in January was largely due to known vulnerabilities and human errors, a research report by Fox-IT showed.
The hidden complexity of privileged access management
Implementing Privileged Access Management (PAM) in hybrid IT environments is rarely straightforward.


