
“Watch your back” or “I've got your back”?
Chief Information Security Officer or CISO – sounds great, but is it? It sounds like an amazing position if all goes well… But what if your organization suffers from a large-scale cyber incident? Unlike...

Fighting cybercrime in a more targeted way with "Melissa"
On October 3, the "Melissa" covenant was signed by The Public Prosecution Service (OM), the police, the National Cyber Security Center (NCSC), Cyberveilig Nederland, and ten private parties. In this...

The threat landscape evolves: CISOs need to advocate for better cyberresilience
While the threat landscape is continuously evolving, our attack surface is growing too, says Dimitri van Zantvliet, Director Cybersecurity & CISO at NS and one of the initiators of the CISO community. CISOs...

Moving toward a decentralized digital identity – what’s changing?
In the next few years, the EU expects 80% of citizens to use digital identity for public services. While moving to a decentralized digital identity framework will provide opportunities for every industry,...

“CISOs should have a prominent place on the board – and beyond”
The CISO will be an important stakeholder in the coming years, according to Rob Beijleveld, one of the initiators of the CISO community. CISOs have to take steps to develop their role, increase...

'Guy Fawkes' and the digital rebellion
An exploration from historical icon to contemporary symbol The mask featuring the mug of Guy Fawkes – a figure from the English seventeenth century – with its iconic white face, subtle smile, mustache,...

CSBN 2023: Digital threat to the Netherlands undiminished
Every organization must be prepared for unexpected attacks, warns the National Coordinator for Counterterrorism and Security (NCTV), who published the Cybersecurity Assessment of the Netherlands (CSBN) 2023...

Sharp increase in attacks on decision makers' cloud accounts
The number of successful cyberattacks taking over the cloud accounts of top executives has increased by more than 100 percent. Cybercriminals are using a phishing tool – EvilProxy – based on a reverse...

Organizations fend off 6 out of 10 attacks
Security teams make four "impossible" trade-offs when fending off threats. They must decide which attacks to prioritize; choose which vulnerabilities to fix; optimize prevention or detection controls, and...

Government decides on one organization for cybersecurity
The Cabinet has decided to merge the existing cybersecurity organizations of the central government. The National Cyber Security Center (NCSC) of the Ministry of JenV, the Digital Trust Center (DTC), and...