Hit enter to search

Author Avatar

Ransomware over the counter!

Recoil, Cryptonite, Ghostly, etc. are just some of the ransomware programs offered for sale in late 2019. No, you're not dreaming. It is now possible to buy Ransomware “thanks” to the development of...

Read More
Author Avatar

My cyberwishes for 2020

Ransomware and cryptolocker are the words I've heard the most about in our coffee corner in 2019, both from companies and individuals. Is now a good time to trivialise these things?

Read More
Author Avatar

How ethical hackers saved your privacy and PowerPoint presentations

Is your data safe? The question is more hot than ever with a new breach in Barco's Clickshare presentation system. Discover how ethical hackers saved you from a bad night's sleep! 

Read More
Author Avatar

SWAPGS Attack — New Speculative Execution Flaw Affects All Modern Intel CPUs

A new variant of the Spectre (Variant 1) side-channel vulnerability has been discovered that affects all modern Intel CPUs, and probably some AMD processors as well, which leverage speculative...

Read More
Author Avatar

Discover our new Quick Recovery Solution for Intel X86

We are proud to present our new Disaster Recovery (DR) solution for Intel X86. It has quite a few advantages, take a look.

Read More
Author Avatar

Continuous Monitoring & Patching: How to have a strong Patch Management process

Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how we...

Read More
Author Avatar

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar

Security Hardening Audit for dummies

How does it work? Which score will you get? We'll explain it here!

Read More
Author Avatar

Where are you with your ransomware recovery strategy? Step 3: Backup & Recovery Strategy

We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.

Read More
Author Avatar

Where are you with your ransomware recovery strategy? Step 2: End Point & Server Protection Strategy

Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center will...

Read More

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article