The results represent the current state of operational technology (OT) security and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In...
The ongoing changes in QR code phishing, or quishing, show us that it is important to be observant and to not heavily rely on our email security systems.
By making security concrete and tangible, the implementation of NIS2 will create more understanding for the role of CISO, says Justin Broeders, concern-level CISO at the Ministry of Finance.
With this ebook, you will: Discover how continuous asset discovery can help you maintain a comprehensive inventory of your organization's IT assets, reducing the risk of undetected vulnerabilities. Learn...
Modern software development heavily relies on third-party and open-source libraries and packages. While these boost efficiency, they also introduce significant risks, which underscore the critical need for...
Unplanned downtime Last month, Netflix released a documentary series about the Ashley Madison data breach. Ashley Madison, a commercial dating website aimed to enable extramarital affairs, was shut down...
This first edition of the biennial assessment focuses on complex online crime-targeting ICT systems. The report is unique because it provides insight into the cybercrime landscape from an investigation...
To begin the journey toward "augmented cybersecurity," Gartner’s label for a cybersecurity function that has elevated response and recovery to equal status with prevention, CISOs should prioritize three...
The first CISODAY was kicked off by moderator Joost Hoebink, who called the two CISO community founders and CISO Platform board members on stage. Founder Dimitri van Zantvliet commemorated Steve Katz, who...
As CISOs, we have a responsibility to drive collaboration and technological innovation within the Netherlands