<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
German website
search
close

BIO en GGI-Veilig met Attack Surface Management

Gemeenten moeten voldoen aan de BIO. Het GGI-Veilig framework maakt de beveiligings-eisen inzichtelijk. Hoe werkt het? En hoe helpt ASM? Lees het hier.

Download whitepaper

Tackling the Exponential Growth of the Attack Surface

In this whitepaper, CISO Vincent Thiele takes a look at the challenges and best practice to manage and control your attack surface.  

Download Now

Editorial: WHY API SECURITY MIGHT BE THE NEXT BIG THING

API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.

Read editorial

Video | Attack Surface Management Explained

Focusing on one risk type over others will leave you with blind spots elsewhere in your attack surface. In this video, we explain how attack surface management provides your organisation with the insights you need to reduce your risk exposure.

Watch Video

EXCHANGE CVES: THE RESPONSE PLAN GAP

It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.

Read editorial

PANELDISCUSSIE: TRAIN AS THEY FIGHT

Cybercriminelen dringen volautomatisch jouw IT systemen binnen via zwakke plekken of via jouw leveranciers. Hoe bereid je je hierop voor? Experts delen hun inzichten 

Kijk on-demand

Supply Chain Attacks

Eward shares his personal insights on the 3 types of supply chains, the potential threats of each one to your organisation, and how to minimise these risks. 

Read editorial

On-Demand webinar | CEO chat: reflections & predictions

The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021. 

Watch on-demand

Patrolling the seas for cyber-pirates, while the leak is in your boat

We can be so preoccupied looking for incoming threats and attacks, we forget to lock the back door - or don’t even know of the door’s existence. When the bigger picture of your attack surface is incomplete, how can you tell what is most at risk? What should you secure first?

Watch on-demand

Do you have a question?

Our experts have the answers

Contact us