Hit enter to search

Author Avatar
10/01/2020

My cyberwishes for 2020

Ransomware and cryptolocker are the words I've heard the most about in our coffee corner in 2019, both from companies and individuals. Is now a good time to trivialise these things?

Read More
Author Avatar
17/12/2019

How ethical hackers saved your privacy and PowerPoint presentations

Is your data safe? The question is more hot than ever with a new breach in Barco's Clickshare presentation system. Discover how ethical hackers saved you from a bad night's sleep! 

Read More
Author Avatar
25/11/2019

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

A new variant of the Spectre (Variant 1) side-channel vulnerability has been discovered that affects all modern Intel CPUs, and probably some AMD processors as well, which leverage speculative...

Read More
Author Avatar
05/11/2019

Discover our new Quick Recovery Solution for Intel X86

We are proud to present our new Disaster Recovery (DR) solution for Intel X86. It has quite a few advantages, take a look.

Read More
Author Avatar
09/10/2019

Continuous Monitoring & Patching: How to have a strong Patch Management process

Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how...

Read More
Author Avatar
03/09/2019

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar
20/08/2019

Security Hardening Audit for dummies

How does it work? Which score will you get? We'll explain it here!

Read More
Author Avatar
07/08/2019

Where are you with your ransomware recovery strategy? Step 3: Backup & Recovery Strategy

We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.

Read More
Author Avatar
30/07/2019

Where are you with your ransomware recovery strategy? Step 2: End Point & Server Protection Strategy

Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center...

Read More
Author Avatar
24/07/2019

Where are you with your ransomware recovery strategy? Step 1: Perimeter strategy

Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.

Read More

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article