
A hacker’s wishlist for Christmas
Each year, cyberattacks increase dramatically during the holiday season. Criminals know how to take advantage of a busy season in which companies endure chaos and employees are busy, stressed, tired, and...

CISO community, CISO Platform Nederland established officially
The CISO community Nederland and the associated CISO Platform Nederland are a reality. The new combination supports Dutch companies' Chief Information Security Officers (CISOs) in various industries,...

“Watch your back” or “I've got your back”?
Chief Information Security Officer or CISO – sounds great, but is it? It sounds like an amazing position if all goes well… But what if your organization suffers from a large-scale cyber incident? Unlike...

Fighting cybercrime in a more targeted way with "Melissa"
On October 3, the "Melissa" covenant was signed by The Public Prosecution Service (OM), the police, the National Cyber Security Center (NCSC), Cyberveilig Nederland, and ten private parties. In this...

The threat landscape evolves: CISOs need to advocate for better cyberresilience
While the threat landscape is continuously evolving, our attack surface is growing too, says Dimitri van Zantvliet, Director Cybersecurity & CISO at NS and one of the initiators of the CISO community. CISOs...

Moving toward a decentralized digital identity – what’s changing?
In the next few years, the EU expects 80% of citizens to use digital identity for public services. While moving to a decentralized digital identity framework will provide opportunities for every industry,...

“CISOs should have a prominent place on the board – and beyond”
The CISO will be an important stakeholder in the coming years, according to Rob Beijleveld, one of the initiators of the CISO community. CISOs have to take steps to develop their role, increase...

'Guy Fawkes' and the digital rebellion
An exploration from historical icon to contemporary symbol The mask featuring the mug of Guy Fawkes – a figure from the English seventeenth century – with its iconic white face, subtle smile, mustache,...

Sharp increase in attacks on decision makers' cloud accounts
The number of successful cyberattacks taking over the cloud accounts of top executives has increased by more than 100 percent. Cybercriminals are using a phishing tool – EvilProxy – based on a reverse...

Organizations fend off 6 out of 10 attacks
Security teams make four "impossible" trade-offs when fending off threats. They must decide which attacks to prioritize; choose which vulnerabilities to fix; optimize prevention or detection controls, and...