Congres update

16 January 2024

Whitepaper: A roadmap to Zero Trust Architecture

Traditional network architecture was built with the concept of a perimeter network where once someone was on the network, there was an implicit level of trust. The shift toward cloud hosting, remote work and other modernization has created challenges with a traditional perimeter network architecture.

Continue reading
16 January 2024

Whitepaper: The CIO’s guide to WAN transformation

Employees need to be able to work from anywhere. And they need to do so securely. Legacy WANs and SD-WANs can’t keep up with hybrid work, SaaS usage, and cloud computing. Here’s how to transform your WAN for today’s distributed, hybrid-cloud world.

Continue reading
16 January 2024

Whitepaper: 2024 API Security & Management Report

The Internet is an endless flow of conversations between computers. These conversations often take place using application programming interfaces (APIs), which allow us to interact with software and apps in new ways. For instance, OpenAI’s ChatGPT API enables Slack to streamline chat-based workflows, and Booking.com to deliver more personalized trip planning experiences. Today, APIs outpace […]

Continue reading
15 January 2024

Whitepaper: Human Risk Review 2023

De Europese situatie op het gebied van cyberdreigingen: Inzichten en strategieën van experts. Het hoeft eigenlijk niet meer benadrukt te worden, en toch is het nog nooit zo treffend geweest als vandaag

Continue reading
15 January 2024

BlackBerry Cybersecurity – Global Threat Intelligence Report, Executive Summary, edition November 2023

Cyberattacks rose significantly from June through August 2023, according to data from the BlackBerry Global Threat Intelligence Report – November 2023. During those months, BlackBerry Cybersecurity solutions stopped over 3.3 million attacks. That’s an average of 26 attacks per minute—more than double the number in our previous report, which recorded 1.5 million attacks. Download the [...]
Continue reading
15 January 2024

New Network and Information Security Directive NIS2

Help your organisation to comply with the European Union’s NIS2 directive with Thales. In 2016, the European Commission proposed the EU Network and Information Security (NIS) directive. The NIS directive was the first piece of EU-wide cybersecurity legislation. The goal was to enhance cybersecurity across the European Union. The NIS directive was adopted in 2016 [...]
Continue reading
15 January 2024

Whitepaper: Identity lifecycle and governance at the speed of business

Full visibility and control over the access to applications and data in your digital landscape is becoming a necessity for any company. Achieving this is now possible through a single pane of glass by using Okta. Being a cloud-first product, Okta provides unprecedented speed through automations and brings ease of maintenance in the Identity Governance […]

Continue reading