Blogs.

Are new employees the weakest link in your organisation?
We have all been there: starting a new job can be very overwhelming. There are...


Log4j Critical Updates by Eye CERT
Introduction Attackers are actively exploiting a remote code execution...


5 tips to secure your company for free
No matter how big or small your company is, everyone has crown jewels: crucial...


How does machine learning in cybersecurity help detect threats?
Machine learning makes an important contribution to cybersecurity by...


What is social engineering and how do I protect my company against it?
Social engineering is the temptation of people to reveal sensitive information...


What is a Zero Day? How to Ensure Zero Day Protection for Your Company
A zero day is an unresolved vulnerability in software that puts end users at...


You can protect yourself against supply chain ransomware – here's how
Still in shock, the media is suggesting that there is little that can be done...


Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...


What you want to know from your IT supplier in the field of security
Within SMEs there is still the impression that they are not of interest to...


Breaking ABUS Secvest internet-connected alarm systems (CVE-2020-28973)
ABUS Secvest is a wireless alarm system that is marketed at consumers and small...
