This day was not picked at random, as the first Data Protection Treaty was signed on 28 January 1981.
Since September 2018 the monthly CoderDojo sessions for the Antwerp Centre department are held in our office at the Grotehondstraat in Antwerp.
In this months newsletter: A guest article by Chris Romeo covering “Threat modeling: better caught than taught”
The energy clusters Flux50 (Flanders) and TWEED (Wallonia) organize the Belgian Pavilion at European Utility Week in Paris from 12 until 14 November 2019.
Some transactions on blockchain require or involve cryptocurrencies, which are sent to smart contracts. Storing cryptocurrencies requires a wallet.
We compiled a list of 5 essential cybersecurity practices that you absolutely must implement to get the basics of cybersecurity right.
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly what it is. Threat modeling…
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…