
Sharp increase in attacks on decision makers' cloud accounts
The number of successful cyberattacks taking over the cloud accounts of top executives has increased by more than 100 percent. Cybercriminals are using a phishing tool – EvilProxy – based on a reverse...

Organizations fend off 6 out of 10 attacks
Security teams make four "impossible" trade-offs when fending off threats. They must decide which attacks to prioritize; choose which vulnerabilities to fix; optimize prevention or detection controls, and...

Government decides on one organization for cybersecurity
The Cabinet has decided to merge the existing cybersecurity organizations of the central government. The National Cyber Security Center (NCSC) of the Ministry of JenV, the Digital Trust Center (DTC), and...

An administrative view of cybersecurity at Dutch Railways
Cyber threats can occur at Dutch Railways (Nederlandse Spoorwegen or NS) in various places: trains, stations, workplaces, data centers, websites, mobile apps, and the chain. According to CISO Dimitri van...

Gunther Cleijn: "Deploy highly skilled security specialists more efficiently"
Gunther Cleijn is Global CISO at NewCold, a company specializing in building and managing cold storage facilities worldwide. Like so many CISOs, he faces a severe shortage of security specialists. His...

Justin Broeders (Eneco): "Zero trust is not just about technology"
Eneco, part of the vital infrastructure since June this year, takes cybersecurity very seriously. The next few years will, therefore, be marked by the adoption of zero-trust practices and architecture. We...