What exactly are cookies and how do they work?
We organized a panel debate on cybersecurity on Kanaal Z. In case you’ve missed it, check the recording here.
Toreonite Wouter Coudenys decided to register for the ‘Hacking and Securing Cloud Infrastructure’, as a way to explore a specialization in the line of webapp…
Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.
The latest ‘RSA Cybersecurity Poverty Index’ – an annual maturity self-assessment completed by a variety of organisations all over the world – shows that 67%…
Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that…