Security & growth: Can we achieve the best of both worlds?
12 February 2025

Security & growth: Can we achieve the best of both worlds?

Pressure on CISOs is ever-increasing. Not only are security leaders held to an extremely high standard, but they also have to work with other teams to support business strategies.

4 months ago
More compliance, more problems?
7 February 2025

More compliance, more problems?

The increased need to comply with regulations causes a loss of focus on underlying risks – which can ultimately jeopardize a company's continuity.

4 months ago
CISOs are gaining ground in the boardroom
31 January 2025

CISOs are gaining ground in the boardroom

Chief Information Security Officers are gaining more influence within the C-suite and boardrooms.

4 months ago
2025: The Year Cybersecurity Becomes a National Priority
28 January 2025

2025: The Year Cybersecurity Becomes a National Priority

In 2025, I hope The Netherlands fully embraces the fourth industrial revolution – with a fundamental shift in mindset. Cybersecurity must no longer be treated as an afterthought.

4 months ago
2025’s cyber threats call for a multilayered, proactive approach
23 January 2025

2025’s cyber threats call for a multilayered, proactive approach

One of the alarming trends is the incorrect use of IT resources by employees, or misuse, according to Orange Cyberdefense’s Security Navigator report.

4 months ago
Do we need a Dutch AI factory?
16 January 2025

Do we need a Dutch AI factory?

The Dutch government has engaged in talks with U.S. chip firms Nvidia and AMD about the development of an AI facility, it said in a statement last week which has been taken down since.

4 months ago
Trump & cybersecurity policy: what to expect?
10 January 2025

Trump & cybersecurity policy: what to expect?

With the start of Trump’s second term, we can expect significant shifts in cybersecurity policies and broader tech-related issues.

5 months ago
2025’s observability predictions
7 January 2025

2025’s observability predictions

Observability is transforming from a reactive to a proactive practice. What’s next in 2025? These are the five observability predictions according to Splunk.

5 months ago
Facial ID farming: a threat for biometric security checks
6 January 2025

Facial ID farming: a threat for biometric security checks

According to researchers, cybercriminals have engineered a simple but sophisticated scheme to circumvent facial identity verification systems through coordinated data collection on the dark web.

5 months ago
HSMs: A critical component of an enterprise's cybersecurity strategy
18 December 2024

HSMs: A critical component of an enterprise's cybersecurity strategy

The best way to safeguard cryptographic keys — and ultimately protect critical data — is with hardware security modules (HSMs) specifically designed to safeguard and manage them.

5 months ago