Whitepapers

May 2, 2023

Interview Chris Kubecka

In preparations for Cyber Resilience Conference, we spoke with Chris Kubecka, CEO of HypaSec, a security firm she founded in 2015. Chris Kubecka is an American computer security researcher and cyberwarfare specialist. In 2012, Kubecka was responsible for getting the Saudi Aramco network back up and running after it was hit by one of the [...]
Continue reading
April 18, 2023

Global threat report

The latest edition of the CrowdStrike Global Threat Report comes at an important time for protectors around the world. As organizations focus on managing remote and hybrid teams, operationalizing years of digital transformation and navigating an uncertain global economy, adversaries have become more sophisticated, relentless and damaging in their attacks. As a result, a number [...]
Continue reading
March 29, 2023

Achieve Digital Sovereignty with Thales

Digital sovereignty refers to the ability to have control over your own digital destiny – the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by [...]
Continue reading
March 22, 2023

What is the European Cyber Resilience Act

What is the European Cyber Resilience Act Given the number of cybersecurity threats – like ransomware…or worse, knowing what is happening unseen online in the context of the war in Ukraine – it should be crystal clear by now that cybersecurity needs to be a topic that should be at the top of every organisation’s [...]
Continue reading
January 19, 2023

Securing your cloud migration at the speed of innovation

Cloud migrations are a transformative undertaking with many moving parts. Implementing a strong security foundation as you migrate creates a shared understanding of the cloud among all cloud teams, visibility into the cloud to keep up with the migration, and allows teams to move fast, securely. In this whitepaper, we explore the challenges and key [...]
Continue reading
January 9, 2023

Accelerate your cyber insurance initiatives with falcon identity protection

Reduce risk and complexity with hyper-accurate threat detection and real-time prevention of identity-based attacks According to the 2022 CrowdStrike Global Threat Report, ransomware-related data leaks increased by 82% from 2020 to 2021. And, According to the 2021 CrowdStrike Global Security Attitude Survey, 66% of organizations suffered at least one ransomware attack in 2021.

Continue reading
December 2, 2022

2022 Gartner Critical Capabilities Report for Data Integration Tools

Read this complimentary report to the Gartner® Magic Quadrant™ for Data Integration Tools to evaluate 21 vendors and learn which vendor is most likely to meet your data modernization needs. The critical capabilities report will help you evaluate the vendors across 12 different critical capabilities and 4 different Use Cases, namely: ● Data Engineering ● [...]
Continue reading
October 5, 2022

How CIAM reduces costs and increases revenue

CIAM’ covers a set of capabilities that enable you to securely, efficiently and compliantly verify and manage customer, partner, or other external user identities in your digital services, and control user access to areas of your services. These capabilities may include self-service account credential management, single sign-on (SSO),

Continue reading
September 14, 2022

Mobile authentication app on the CSAM page

myID.be will soon appear as the second mobile authentication app on the CSAM page for eID login at all governments in Belgium, as well as all public benefit organizations that also use this CSAM page, such as health insurance funds and social secretariats, trade unions … . myID.be for citizens To prove your identity on [...]
Continue reading