Het GGI-Veilig framework maakt de beveiligings-eisen inzichtelijk voor gemeenten, waterschappen en provincies. Hoe werkt het? En hoe helpt ASM? Lees het hier.
Tackling the Exponential Growth of the Attack Surface
In this whitepaper, CISO Vincent Thiele takes a look at the challenges and best practice to manage and control your attack surface.
IT Governance: OVERSEEING YOUR DIGITAL FOOTPRINT
Organisational reliance on IT is increasing and outsourcing of services grows. What individual components are necessary for successful IT governance strategy
WHITEPAPER: Subdomain Takeovers
This whitepaper breaks down how malicious actors can take control over your website page. What is the impact to your organisation?
MAPPING DRM & Attack Surface Management TO MITRE PRE-ATT&CK®
This paper maps the MITRE PRE-ATT&CK matrix to Digital Risk Monitoring and digital footprint solutions. It provides insights into the tactics, techniques and tools cyber-criminals might use, and how you can leverage these strategies to detect and prevent incoming attacks.
4 key takeaways of the European Banking Authority's outsourcing guidelines
Financial institutions and other organisations outsource parts of their IT infrastructure. Though it brings many opportunities, it also increases the digital attack surface of your own organisation. Your own cyber-resilience may be up to par, but is your suppliers’ too?
THE NEED FOR EFFECTIVE FOOTPRINT MANAGEMENT
Most organisations have only limited visibility of their online digital assets and web-facing networks, which is one of the primary impediments of securing those systems.Without full knowledge of online digital assets, vulner-abilities, network additions and changes, defende
Phishing - The Million Euro Threat to Your Business
Of all the cyber threats faced by modern organisations, phishing is among the deadliest. Many of the highest profile breaches over the past two decades — including those affecting major banks, retail chains, and government organisations — were made possible because one person clicked a link or attachment in a phishing email.