Hit enter to search

Author Avatar

Understanding BGP Hijacking: Protecting Your Network from Cyber Threats

 In 2024, we identified several risks, but we will highlight one in particular: BGP hijacking.

Read More
Author Avatar

BlueHorn introduces the Network Traffic Analyzer

The BlueHorn Team is thrilled to unveil a major new feature that will significantly boost our customers' security and monitoring capabilities: theNetwork Traffic Analyzer.

This cutting-edge tool...

Read More
Author Avatar

Is MDR scalable for businesses of different sizes?

In our previous blog post, we explored the fundamentals of Managed Detection and Response (MDR), highlighting how it differs from traditional security solutions and the types of threats it can...

Read More
Author Avatar

Introducing our new security vendor: Drata

As of today, Easi is proud to announce that we have become one of the first official partners representing Drata in the BeLux market. This new partnership marks a significant milestone for us, and...

Read More
Author Avatar

Managed Detection and Response in a nutshell

Traditional security measures often fall short, as threats are more sophisticated and frequent than ever. To bridge the gap, many organizations are turning to Managed Detection and Response (MDR) as...

Read More
Author Avatar

NIS2 Directive Summary

The aim of the NIS Directives is to strengthen the collective level of cybersecurity of EU Member States by increasing cybersecurity enforcement requirements for critical infrastructure sectors. But...

Read More
Author Avatar

What is a SOC (Security Operations Center) and why does my company need one?

A SOC, not to be confused with the socks on your feet, is a real security solution that can save companies a lot of money and headaches. We spoke with Robin Bruynseels (Cybersecurity and SOC engineer...

Read More
Author Avatar

Do you know your own disaster procedure ?

What do you do when your information technology stops working? Read on to discover tips to include in your procedure.

Read More
Author Avatar

Improve Your Security with the Microsoft Authenticator App

Avoid MFA fatigue caused by traditional methods and start using the Microsoft Authenticator App.

Read More
Author Avatar

Is SD-WAN really the next big thing?

Can SD-WAN really take you to the promised land, and what do you have to bear in mind? I will be happy to explain it to you below!

Read More

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article