Contact us
Request demo →
Contact us
German website
search
close

Video | Tips to achieving zero shadow-IT

In this video, our CEO Pieter Jansen explains the risk of shadow IT and shares tips on how to minimise the risk for your organisation.

Watch video

Webinar | The threat of open directories

In this webinar, we talk about the threats of open directories, our research and how to protect your organisation.

Watch on-demand

Open directories: our research findings

In our previous blogs to this open directory series, we talked about what open directories are and why they pose a risk, and how we set up our own research into the extent of the issue. That also featured a sneak peek into the results. Now that we have presented the findings in our webinar, this article will cover the statistics and most striking examples. And most importantly: what are our conclusions and tips to make your own directories data leak free?

Read more

Open Directories: A Peek Into Our Research

In our previous blog, we explained what open directories are and how they can result in a data leak. As mentioned there, we conducted research into the risks of open directories ourselves, to see the extent of the problem. We’ll go into the method and preliminary results of that research here, while leaving the most telling examples and conclusions for our webinar on Wednesday 1 December.

Read more

Editorial: 6 steps to achieving zero shadow IT

Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process, and is normally split into two categories: / Systems that the IT department doesn’t know about. / Systems the IT department knows about but needs to keep running as they are integral to business operations. The second category is the real Shadow IT and the biggest problem for businesses. So how can you protect your business from the perils of shadow IT? Here are Pieter's six steps.

Read more

Lancering handleiding digitale veiligheid zó hack je een stad

Den Haag, 11 november 2021 - Vandaag heeft wethouder Saskia Bruines bij het ECP Jaarfestival 2021 de handleiding ‘Zó hack je een stad’ gelanceerd en deze overhandigd aan Tineke Netelenbos, voorzitter van ECP en lid van de Cyber Security Raad, het onafhankelijke adviesorgaan van het kabinet.

Read more

Zó hack je een stad

In de e-guide leest u wat er nodig is om uw digitale veiligheid continu te verbeteren en hoe u ethische hackers hierbij kunt betrekken.

Download

The Threat of Open Directories

01-12-2021 |In this webinar, we'll talk about the  threats of open directories and how to protect your organisation.

Read more

Cybersprint nominated for Deloitte's Technology Fast 50

We are excited to have been included the Deloitte Technology Fast 50  list. Cybersprint is one of the 50 technology companies in the Netherlands to be recognised for exceptional growth performance in the last four years.

Read more

Why you need to know your certificate supply chain

Last week, on Thursday 30 September, a root certificate from Let’s Encrypt expired. This is not uncommon in itself, but as the certificate had no update or alternative, it meant that all domains and subdomains running the certificate were suddenly no longer listed as SSL / TLS-secured. The result: thousands of web pages and applications failed and were unable to serve the content people requested. What went wrong? And what can organisations do to fix similar issues in the future?

Read more

Do you have a question?

Our experts have the answers

Contact us