Blog

How Tech Will Beat COVID-19

With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the meantime is for technology to save the day. Here’s how… By now we’ve all become almost fatigued with the news cycle’s daily curves that grimly tell the tale of our times. That the COVID-19 virus…
Read more

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more

Scorecarding in the Age of Threat

There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security scene for five years as IT admins looked for a simple and fast answer to a critical question: how safe is my network? The answer was to monitor critical aspects that would serve as key indicators on…
Read more

First You Secure, Then You Score!

You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks. It’s a natural behavior for us humans, to be a bit skeptical. Better to be sure by testing, checking, trying. It’s a similar feeling with implementing a firewall. You fire it up and if it…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is racing to remove them. But IAM is much more than that—it combines key areas: Secure Authentication —facilitating the multi-factor authentication in a user-friendly way, Network…
Read more

Authentication Is What You Do As Much As Who You Are

We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different sites that we navigate. And because our brain craves simplicity, we typically use the same password for all those sites. We make them easy to…
Read more

The New Threat Is You

How cybersecurity has Evolved: a View from the Trenches. Sometimes I hear the words ’20 years in the business’ and think that sounds so substantial; so long. Fully half my life has been spent in the world of cybersecurity: creating software to protect networks, analyzing the expanding threat surface and how it has morphed. It…
Read more

On Third-Party Libraries and Security

Don’t reinvent the wheel. If you went to a computer science college or read some of the popular programming books, you would often stumble upon this advice, often written in big bold letters to highlight its importance. It’s sound advice, we shouldn’t reinvent things; instead we should improve those things that already exist. Developers nowadays…
Read more

Seeing the Wolf in the Herd: Analytics In the Age of Ransomware

In 2019, one of the most severe ransomware attacks ever reported happened to a Scandanavian aluminium supplier, costing almost €75 million in damages. But they’d rather that then pay the ransom. Also, it’s a tale of how predictive analytics is coming to the fore in ransomware prevention. This is their story. It was a sunny…
Read more

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will they pass the peak of the Hype Cycle and deliver more true business value and improved security in 2020? AI at its best  The truth is that AI is a very diverse beast. It has…
Read more