Whitepaper: Managing NIS2
Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld?
Whitepaper: A roadmap to Zero Trust Architecture
Traditional network architecture was built with the concept of a perimeter network where once someone was on the network, there was an implicit level of trust. The shift toward cloud hosting, remote work and other modernization has created challenges with a traditional perimeter network architecture.
Whitepaper: The CIO’s guide to WAN transformation
Employees need to be able to work from anywhere. And they need to do so securely. Legacy WANs and SD-WANs can’t keep up with hybrid work, SaaS usage, and cloud computing. Here’s how to transform your WAN for today’s distributed, hybrid-cloud world.
Whitepaper: 2024 API Security & Management Report
The Internet is an endless flow of conversations between computers. These conversations often take place using application programming interfaces (APIs), which allow us to interact with software and apps in new ways. For instance, OpenAI’s ChatGPT API enables Slack to streamline chat-based workflows, and Booking.com to deliver more personalized trip planning experiences. Today, APIs outpace […]
Whitepaper: Human Risk Review 2023
De Europese situatie op het gebied van cyberdreigingen: Inzichten en strategieën van experts. Het hoeft eigenlijk niet meer benadrukt te worden, en toch is het nog nooit zo treffend geweest als vandaag
BlackBerry Cybersecurity – Global Threat Intelligence Report, Executive Summary, edition November 2023
New Network and Information Security Directive NIS2
Whitepaper: How to Choose a Secrets Management Solution
Modern IT environments are powered by an exponentially growing number of secrets. As organisations adopt cloud computing, containers, microservices and DevOps practices, the number of secrets required for authentication and encryption proliferates rapidly.