
2025’s observability predictions
Observability is transforming from a reactive to a proactive practice. What’s next in 2025? These are the five observability predictions according to Splunk.

A CISO’s guide to cybersecurity in action
Discover practical recommendations for top-tier technologies and tools to augment and elevate your security initiatives as a CISO. Unlock power and potential.

Fighting cybercrime with open-source SOAR tools
To combat the challenges around the existing SOAR tools and help organizations improve their cybersecurity posture, TNO has launched an open-source SOAR tool.

Select Cybersecurity Week in The Hague kicks off
What's happening? The international city of peace and justice is a global hub for cybersecurity. Acknowledging the threats and opportunities of the digitizing world, the city prioritizes sharing knowledge,...

The stakes are high in OpenAI’s shift to for-profit
The OpenAI changes OpenAI seems to be pushing ahead with plans to become a for-profit company, Reuters reported after the unexpected departure of Chief Technology Officer Mira Murati. The ChatGPT developer...

CISO Platform Nederland, ECSO form partnership
Opening opportunities for both organizations, the partnership is expected to strengthen personal relationships and knowledge and help fortify defenses against cybercrime. It will also give CISO Platform...

Chinese botnet contains thousands of Dutch devices
Cyber actors linked to China have compromised over 260,000 devices with the goal of creating a botnet, the FBI reported this week. Of those devices, thousands are located in the Netherlands.

“AI allows us to upskill our entire team”
By implementing AI and automation tools in the right way, a significant opportunity arises to drive career growth in security teams, according to Ian Stacey, Group Head of Information Security at Novuna and Cal

"Threat actors are increasingly targeting OT organizations," report
The results represent the current state of operational technology (OT) security and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In...

The three-point action plan for new CISOs
With this ebook, you will: Discover how continuous asset discovery can help you maintain a comprehensive inventory of your organization's IT assets, reducing the risk of undetected vulnerabilities. Learn...