Contact us
Request demo →
Contact us
search
close

Webinar | The threat of open directories

In this webinar, we talk about the threats of open directories, our research and how to protect your organisation.

Watch on-demand

HOW TO HACK A CITY / Zó hack je een stad

Discover what is needed to prepare your organisation for continuous improvement of digital security and how you can involve ethical hackers in this process.

Download

6 steps to achieving zero Shadow IT

Shadow IT has long been a problem for organisations. Formal IT is routed through the IT department, where it’s approved, purchased, set up, and, importantly, supported and maintained. Shadow IT falls outside this process.

Read editorial

Attack Surface Management flyer

Knowing your attack surface is essential for managing digital risk & protecting your organisation. Read more about attack surface management in this flyer.

Download now

BIO en GGI-Veilig met Attack Surface Management

Het GGI-Veilig framework maakt de beveiligings-eisen inzichtelijk voor gemeenten, waterschappen en provincies. Hoe werkt het? En hoe helpt ASM? Lees het hier.

Download whitepaper

Tackling the Exponential Growth of the Attack Surface

In this whitepaper, CISO Vincent Thiele takes a look at the challenges and best practice to manage and control your attack surface.  

Download Now

Editorial: WHY API SECURITY MIGHT BE THE NEXT BIG THING

API security is one of those essential elements, as it’s rooted in so many processes. Yet, it’s still easily overlooked. API security needs a second component to be effective. In this insight, I will outline what that is and why you need it.

Read editorial

Video | Attack Surface Management Explained

Focusing on one risk type over others will leave you with blind spots elsewhere in your attack surface. In this video, we explain how attack surface management provides your organisation with the insights you need to reduce your risk exposure.

Watch Video

EXCHANGE CVES: THE RESPONSE PLAN GAP

It’s been two weeks since Microsoft released a patch for the Exchange vulnerabilities. For many, the dust has settled. Others are still fighting fires. Today, I’d like to look back at some of the problems we saw. Some were expected, other surprised us.

Read editorial

Do you have a question?

Our experts have the answers

Contact us