Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.
In this months newsletter: A guest article by Izar “Infosec Curmudgeon” Tarandach, Curated resources covering an awesome list of threat modeling resources.
As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…
This day was not picked at random, as the first Data Protection Treaty was signed on 28 January 1981.
Since September 2018 the monthly CoderDojo sessions for the Antwerp Centre department are held in our office at the Grotehondstraat in Antwerp.
In this months newsletter: A guest article by Chris Romeo covering “Threat modeling: better caught than taught”
The energy clusters Flux50 (Flanders) and TWEED (Wallonia) organize the Belgian Pavilion at European Utility Week in Paris from 12 until 14 November 2019.
Some transactions on blockchain require or involve cryptocurrencies, which are sent to smart contracts. Storing cryptocurrencies requires a wallet.
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.