Gemeenten moeten voldoen aan de BIO. Het GGI-Veilig framework maakt de beveiligings-eisen inzichtelijk. Hoe werkt het? En hoe helpt ASM? Lees het hier.
Tackling the Exponential Growth of the Attack Surface
In this whitepaper, CISO Vincent Thiele takes a look at the challenges and best practice to manage and control your attack surface.
Editorial: WHY API SECURITY MIGHT BE THE NEXT BIG THING
API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.
Video | Attack Surface Management Explained
Focusing on one risk type over others will leave you with blind spots elsewhere in your attack surface. In this video, we explain how attack surface management provides your organisation with the insights you need to reduce your risk exposure.
EXCHANGE CVES: THE RESPONSE PLAN GAP
It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.
PANELDISCUSSIE: TRAIN AS THEY FIGHT
Cybercriminelen dringen volautomatisch jouw IT systemen binnen via zwakke plekken of via jouw leveranciers. Hoe bereid je je hierop voor? Experts delen hun inzichten
Supply Chain Attacks
Eward shares his personal insights on the 3 types of supply chains, the potential threats of each one to your organisation, and how to minimise these risks.
On-Demand webinar | CEO chat: reflections & predictions
The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021.
Patrolling the seas for cyber-pirates, while the leak is in your boat
We can be so preoccupied looking for incoming threats and attacks, we forget to lock the back door - or don’t even know of the door’s existence. When the bigger picture of your attack surface is incomplete, how can you tell what is most at risk? What should you secure first?