Hit enter to search

Author Avatar
05/03/2020

Cybersecurity anno 2020: Speed is the new reality

Ransomware pushes dilemmas: will you pay ransom money, what about your reputation? Read here why speed is part of the intervention discussion and why it is important.

Read More
Author Avatar
02/03/2020

Ransomware over the counter!

Recoil, Cryptonite, Ghostly, etc. are just some of the ransomware programs offered for sale in late 2019. No, you're not dreaming. It is now possible to buy Ransomware “thanks” to the development...

Read More
Author Avatar
10/01/2020

My cyberwishes for 2020

Ransomware and cryptolocker are the words I've heard the most about in our coffee corner in 2019, both from companies and individuals. Is now a good time to trivialise these things?

Read More
Author Avatar
17/12/2019

How ethical hackers saved your privacy and PowerPoint presentations

Is your data safe? The question is more hot than ever with a new breach in Barco's Clickshare presentation system. Discover how ethical hackers saved you from a bad night's sleep! 

Read More
Author Avatar
25/11/2019

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

A new variant of the Spectre (Variant 1) side-channel vulnerability has been discovered that affects all modern Intel CPUs, and probably some AMD processors as well, which leverage speculative...

Read More
Author Avatar
05/11/2019

Discover our new Quick Recovery Solution for Intel X86

We are proud to present our new Disaster Recovery (DR) solution for Intel X86. It has quite a few advantages, take a look.

Read More
Author Avatar
09/10/2019

Continuous Monitoring & Patching: How to have a strong Patch Management process

Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how...

Read More
Author Avatar
03/09/2019

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar
20/08/2019

Security Hardening Audit for dummies

How does it work? Which score will you get? We'll explain it here!

Read More
Author Avatar
07/08/2019

Where are you with your ransomware recovery strategy? Step 3: Backup & Recovery Strategy

We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.

Read More

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article