Hit enter to search

Author Avatar

BlueHorn vs Microsoft Sentinel: Choosing the Right SOC Foundation

A few weeks back, we already talked about how SOC Business enables mid-sized companies to monitor, detect, and respond to cyber threats, making IT security simple and effective.

Read More
Author Avatar

New features in Adfinity to improve your financial management

Improve your financial management thanks to Adfinity’s latest updates!

Read More
Author Avatar

With Peppol et Adfinity 2.7, boost your electronic invoicing!

Discover how Adfinity can help you go even further with Peppol!

Read More
Author Avatar

Dashboard Demat: A redesigned interface for greater clarity and fluidity

The Demat Dashboard now includes several enhancements that make your processes even more transparent and tailored to your needs.

Read More
Author Avatar

Microsoft Ignite 2025: Our key takeaways

Microsoft Ignite remains one of the most anticipated and influential events in the IT world. Every year, Microsoft unveils its newest innovations across cloud, AI, security, and modern workplace...

Read More
Author Avatar

Bridging the Security Gap: How SOC Business Empowers Mid-Sized Companies

IT and data play a central role in every modern business. With emerging technologies like AI, hackers also have more ways to exploit vulnerabilities.

Read More
Author Avatar

Synsafe: the 100% Belgian solution that simplifies property managers’ lives

Being a property manager means taking on a multitude of responsibilities every day: managing administrative tasks, coordinating technical interventions, organizing and leading general meetings - all...

Read More
Author Avatar

What the Attack on JLR Teaches Us About OT Resilience

On September 1st, England’s largest auto manufacturer Jaguar Land Rover (JLR) disclosed that it had been hit by a cyber attack. Soon after disclosure, the company was forced to halt production across...

Read More
Author Avatar

Strengthen your Business Continuity with Windows Backup for Organizations

In modern IT, ensuring business continuity is more than just protecting files. A full recovery also depends on having the right settings, configurations, and credentials in place to get users back up...

Read More
Author Avatar

The end of Basic Authentication: is your email flow at risk?

Basic Authentication has been part of email communication for decades. With SMTP AUTH, countless printers, scanners, applications, and websites were able to send emails automatically. But times have...

Read More

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article