Latest news

March 29, 2023

Achieve Digital Sovereignty with Thales

Digital sovereignty refers to the ability to have control over your own digital destiny – the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by [...]
Continue reading
March 22, 2023

What is the European Cyber Resilience Act

What is the European Cyber Resilience Act Given the number of cybersecurity threats – like ransomware…or worse, knowing what is happening unseen online in the context of the war in Ukraine – it should be crystal clear by now that cybersecurity needs to be a topic that should be at the top of every organisation’s [...]
Continue reading
January 19, 2023

Securing your cloud migration at the speed of innovation

Cloud migrations are a transformative undertaking with many moving parts. Implementing a strong security foundation as you migrate creates a shared understanding of the cloud among all cloud teams, visibility into the cloud to keep up with the migration, and allows teams to move fast, securely. In this whitepaper, we explore the challenges and key [...]
Continue reading
January 9, 2023

Accelerate your cyber insurance initiatives with falcon identity protection

Reduce risk and complexity with hyper-accurate threat detection and real-time prevention of identity-based attacks According to the 2022 CrowdStrike Global Threat Report, ransomware-related data leaks increased by 82% from 2020 to 2021. And, According to the 2021 CrowdStrike Global Security Attitude Survey, 66% of organizations suffered at least one ransomware attack in 2021.

Continue reading
December 2, 2022

2022 Gartner Critical Capabilities Report for Data Integration Tools

Read this complimentary report to the Gartner® Magic Quadrant™ for Data Integration Tools to evaluate 21 vendors and learn which vendor is most likely to meet your data modernization needs. The critical capabilities report will help you evaluate the vendors across 12 different critical capabilities and 4 different Use Cases, namely: ● Data Engineering ● [...]
Continue reading
October 5, 2022

How CIAM reduces costs and increases revenue

CIAM’ covers a set of capabilities that enable you to securely, efficiently and compliantly verify and manage customer, partner, or other external user identities in your digital services, and control user access to areas of your services. These capabilities may include self-service account credential management, single sign-on (SSO),

Continue reading
September 14, 2022

Mobile authentication app on the CSAM page

myID.be will soon appear as the second mobile authentication app on the CSAM page for eID login at all governments in Belgium, as well as all public benefit organizations that also use this CSAM page, such as health insurance funds and social secretariats, trade unions … . myID.be for citizens To prove your identity on [...]
Continue reading