CISO: Secure the Future
6 August 2025

CISO: Secure the Future

In this podcast, Dave Maasland talks to none other than Richard Marko, CEO of ESET. From the heart of Europe, he shares how ESET has been working on digital autonomy since day one – long before it became a bu

3 months ago
The Tea breach: the app that promised safety, then leaked it
31 July 2025

The Tea breach: the app that promised safety, then leaked it

[Members only] This week, an app to protect women has become the source of their harm: about 72,000 images – including about 13,000 user images submitted during account verification – were accessed in a bre

3 months ago
AI and application security: time savings and trust issues
7 July 2025

AI and application security: time savings and trust issues

Amidst the excitement surrounding AI, widespread misconceptions exist about its capabilities and limitations. Let us explore more.

4 months ago
From boots to bytes: a strategic shift in the Dutch military
4 July 2025

From boots to bytes: a strategic shift in the Dutch military

This week, Defense Secretary Gijs Tuinman presented the Netherlands’ new digital transformation strategy to the House of Representatives. The strategy is designed to enhance the military’s digital capabilit

4 months ago
Cybersecurity doesn’t have a visibility problem: it has an execution problem
1 July 2025

Cybersecurity doesn’t have a visibility problem: it has an execution problem

Security that waits to act is already too late. So, how do we fix it?

4 months ago
Dutch government commits 70 million euros to AI factory in Groningen
27 June 2025

Dutch government commits 70 million euros to AI factory in Groningen

The Dutch government has announced a €70 million investment in a new artificial intelligence factory to be established in the city of Groningen.

4 months ago
TU Eindhoven hack highlights urgency of closing basic security gaps
19 May 2025

TU Eindhoven hack highlights urgency of closing basic security gaps

The cyber attack on Eindhoven University of Technology (TU/e) in January was largely due to known vulnerabilities and human errors, a research report by Fox-IT showed.

5 months ago
The hidden complexity of privileged access management
15 May 2025

The hidden complexity of privileged access management

Implementing Privileged Access Management (PAM) in hybrid IT environments is rarely straightforward.

5 months ago
Grounds for concern: new malware CoffeeLoader surfaces
14 May 2025

Grounds for concern: new malware CoffeeLoader surfaces

A new and highly evasive malware family, dubbed CoffeeLoader, has been uncovered. First detected in the wild around September 2024, the malware is designed to download and execute second-stage payloads.

5 months ago
Lockbit hack exposes negotiations
9 May 2025

Lockbit hack exposes negotiations

The cybercriminal group Lockbit seems to have suffered a breach of their own, cybersecurity media have reported.

6 months ago