Hit enter to search

Author Avatar
05/11/2019

Discover our new Quick Recovery Solution for Intel X86

We are proud to present our new Disaster Recovery (DR) solution for Intel X86. It has quite a few advantages, take a look.

Read More
Author Avatar
09/10/2019

Continuous Monitoring & Patching: How to have a strong Patch Management process

Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how...

Read More
Author Avatar
03/09/2019

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar
20/08/2019

Security Hardening Audit for dummies

How does it work? Which score will you get? We'll explain it here!

Read More
Author Avatar
07/08/2019

Where are you with your ransomware recovery strategy? Step 3: Backup & Recovery Strategy

We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.

Read More
Author Avatar
30/07/2019

Where are you with your ransomware recovery strategy? Step 2: End Point & Server Protection Strategy

Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center...

Read More
Author Avatar
24/07/2019

Where are you with your ransomware recovery strategy? Step 1: Perimeter strategy

Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.

Read More
Author Avatar
18/07/2019

This is what hackers really love

Why do hackers choose your company? How do they prefer to hack and which assets do they prefer to attack? It's all in the new HackerOne report.

Read More
Author Avatar
03/07/2019

How to increase your security with patch management

Patching different releases on your systems is a lot of work. Discover how patch management will facilitate your work.

Read More
Author Avatar
11/06/2019

Why ransomware should concern you

Ransomware is growing. In size, in scale, in finesse. It is one of the greatest cyber security threats companies are facing right now. Here is an example and some handy tips.

Read More

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article