
CISO Platform Nederland, ECSO form partnership
Opening opportunities for both organizations, the partnership is expected to strengthen personal relationships and knowledge and help fortify defenses against cybercrime. It will also give CISO Platform...

Chinese botnet contains thousands of Dutch devices
Cyber actors linked to China have compromised over 260,000 devices with the goal of creating a botnet, the FBI reported this week. Of those devices, thousands are located in the Netherlands.

RaaS and the commercialization of cybercrime
Ransomware-as-a-Service The RaaS business model makes it easier for non-expert cybercriminals to engage in high-impact ransomware campaigns, as it allows attackers that lack the skills or time to develop...

YubiKeys’ unfixable security flaw: Should you be worried?
Security researchers have detected a vulnerability in YubiKey two-factor authentication tokens that enables attackers to clone the device, its manufacturer Yubico announced this week.

Growing demand for cybersecurity specialists in the Netherlands
In many countries, the demand for cybersecurity professionals is decreasing. But in the Netherlands, organizations are actually looking for them more intensively. The number of vacancies for cybersecurity...

Need for cyber risk management greater than ever
Most organizations do not have the required resources to implement the most advanced cybersecurity controls in all areas. Their key challenge is to ensure that the available resources are allocated towards...

“AI allows us to upskill our entire team”
By implementing AI and automation tools in the right way, a significant opportunity arises to drive career growth in security teams, according to Ian Stacey, Group Head of Information Security at Novuna and Cal

"Threat actors are increasingly targeting OT organizations," report
The results represent the current state of operational technology (OT) security and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In...

Quishing: an evolving threat
The ongoing changes in QR code phishing, or quishing, show us that it is important to be observant and to not heavily rely on our email security systems.

“NIS2 challenges us CISOs to concretize our work”
By making security concrete and tangible, the implementation of NIS2 will create more understanding for the role of CISO, says Justin Broeders, concern-level CISO at the Ministry of Finance.