top of page
Zoeken
Jelle Ermerins
25 nov 20242 minuten om te lezen
The best resources to get your CISSP
It's all about practicing questions Earning your CISSP is challenging—it demands lots of studying, practicing questions, and the right...
0 opmerkingen
Mike van der Bijl
13 nov 20247 minuten om te lezen
Securing the Future: DevSecOps and OWASP SAMM in the Era of technical revolution
In the era of unprecedented digitization, where technology deeply penetrates into our society and organizations, software has become the...
0 opmerkingen
Mike van der Bijl
13 nov 20246 minuten om te lezen
Navigating NIS2: Essential Preparations and Implications for Your Organization
NIS2 is on the horizon, but what should you or your organization do? Which measures need to be taken? Unfortunately the exact guidelines...
0 opmerkingen
Coen Goedegebure
12 feb 202412 minuten om te lezen
Surviving a cyber security job interview (Cryptography)
This article answers 14 typical questions about cryptography you may get during a job interview for a security position
0 opmerkingen
Niels van Nieuwenburg
8 aug 20227 minuten om te lezen
5 ways to improve your cyber security now - Software Developer edition
You probably hear it a lot: you should make your code secure! But…​ how? When it comes to security, there are a plethora of measures you...
0 opmerkingen
Coen Goedegebure
11 nov 20214 minuten om te lezen
Trojans in your source code
Be aware of the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed
0 opmerkingen
Coen Goedegebure
9 nov 20213 minuten om te lezen
Why your company will be hacked
This article highlights a short list of common reasons why companies get hacked and why data breaches occur.
0 opmerkingen
Coen Goedegebure
1 nov 20213 minuten om te lezen
5 Phases of hacking
The process of a typical attack scenario can be broken down into five distinct phases. This article describes the details of each phase.
0 opmerkingen
bottom of page